


default search action
IEEE Transactions on Network and Service Management, Volume 21
Volume 21, Number 1, February 2024
- Katharina Dietz
, Michael Seufert
, Tobias Hoßfeld
:
Want More WANs? Comparison of Traditional and GAN-Based Generation of Wide Area Network Topologies via Graph and Performance Metrics. 4-19 - Hichem Magnouche
, Guillaume Doyen, Caroline Prodhon:
A Fair Sharing Approach for Micro-Services Function Chains Placement in Ultra-Low Latency Services. 20-34 - Daniel Lukaszewski
, Geoffrey G. Xie:
Software Defined Layer 4.5 Customization for Agile Network Operation. 35-50 - Giampaolo Bovenzi
, Alfredo Nascita
, Lixuan Yang
, Alessandro Finamore, Giuseppe Aceto
, Domenico Ciuonzo
, Antonio Pescapè
, Dario Rossi
:
Benchmarking Class Incremental Learning in Deep Learning Traffic Classification. 51-69 - Nozomi Kita
, Fujun He
, Eiji Oki
:
Unavailability-Aware Backup Allocation Model Based on Two-Stage Shared Protection for Middleboxes. 70-87 - Hua Wu
, Yujie Liu
, Guang Cheng
, Xiaoyan Hu
:
RT-CBCH: Real-Time VPN Traffic Service Identification Based on Sampled Data in High-Speed Networks. 88-107 - Nicola Di Cicco
, Memedhe Ibrahimi
, Sebastian Troia
, Massimo Tornatore
:
DeepLS: Local Search for Network Optimization Based on Lightweight Deep Reinforcement Learning. 108-119 - Jiamin Yao
, Chungang Yan
, Junli Wang
, Changjun Jiang
:
Stable QoE-Aware Multi-SFCs Cooperative Routing Mechanism Based on Deep Reinforcement Learning. 120-131 - Jiaxin Wu
, Jigang Wu
, Long Chen
, Yifei Sun
, Yalan Wu
:
Joint Dataset Reconstruction and Power Control for Distributed Training in D2D Edge Network. 132-147 - Qiaolun Zhang
, Omran Ayoub
, Alberto Gatto
, Jun Wu
, Francesco Musumeci
, Massimo Tornatore
:
Routing, Channel, Key-Rate, and Time-Slot Assignment for QKD in Optical Networks. 148-160 - Ubaldo Bucci
, Dajana Cassioli
, Andrea Marotta
:
Performance of Spatially Diverse URLLC and eMBB Traffic in Cell Free Massive MIMO Environments. 161-173 - Khalid Ali
, Manar Jammal:
Proactive VNF Scaling and Placement in 5G O-RAN Using ML. 174-186 - Dimitrios Michael Manias
, Ibrahim Shaer
, Joe Naoum-Sawaya
, Abdallah Shami
:
Robust and Reliable SFC Placement in Resource-Constrained Multi-Tenant MEC-Enabled Networks. 187-199 - Fahri Wisnu Murti
, Samad Ali
, George Iosifidis
, Matti Latva-aho
:
Deep Reinforcement Learning for Orchestrating Cost-Aware Reconfigurations of vRANs. 200-216 - Mohamed Kadry Elhattab
, Maurice Khabbaz
, Nassr Al-Dahabreh
, Ribal Atallah, Chadi Assi
:
Leveraging Real-World Data Sets for QoE Enhancement in Public Electric Vehicles Charging Networks. 217-231 - Miroslaw Klinkowski
:
Optimized Planning of DU/CU Placement and Flow Routing in 5G Packet Xhaul Networks. 232-248 - Zhonghui Li
, Jian Li
, Kaiping Xue
, David S. L. Wei
, Nenghai Yu
, Qibin Sun
, Jun Lu:
Efficient Remote Entanglement Distribution in Quantum Networks: A Segment-Based Method. 249-265 - Zhao Tong
, Xin Deng
, Zheng Xiao
, Dan He
, Anthony Theodore Chronopoulos
, Schahram Dustdar
:
A Bilateral Game Approach for Task Outsourcing in Multi-Access Edge Computing. 266-279 - Jianhang Tang
, Jiangtian Nie
, Yang Zhang
, Zehui Xiong
, Wenchao Jiang
, Mohsen Guizani
:
Multi-UAV-Assisted Federated Learning for Energy-Aware Distributed Edge Training. 280-294 - Antonino Angi
, Alessio Sacco
, Flavio Esposito
, Guido Marchetto
, Alexander Clemm
:
Load Profiling via In-Band Flow Classification and P4 With Howdah. 295-309 - Hui Li, Xiuhua Li, Qilin Fan, Qingyu Xiong, Xiaofei Wang, Victor C. M. Leung
:
Transfer Learning for Real-Time Surface Defect Detection With Multi-Access Edge-Cloud Computing Networks. 310-323 - Jixian Zhang
, Mingyi Zong, Athanasios V. Vasilakos
, Weidong Li
:
UAV Base Station Network Transmission-Based Reverse Auction Mechanism for Digital Twin Utility Maximization. 324-340 - Antonio Galli, Vincenzo Moscato
, Simon Pietro Romano
, Giancarlo Sperlí
:
Playing With a Multi Armed Bandit to Optimize Resource Allocation in Satellite-Enabled 5G Networks. 341-354 - Mostafa Elbediwy
, Bill Pontikakis
, Alireza Ghaffari
, Jean-Pierre David
, Yvon Savaria
:
DR-PIFO: A Dynamic Ranking Packet Scheduler Using a Push-In-First-Out Queue. 355-371 - Lin Cong
, Ying Wang
, Zhengyang Ding, Peng Yu
, Xuesong Qiu
:
Proactive Hybrid-Granularity Slot Allocation for Flexible Ethernet. 372-388 - Tania Panayiotou
, Georgios Ellinas
:
Balancing Efficiency and Fairness in Resource Allocation for Optical Networks. 389-401 - Yijian Hou
, Kaisa Zhang
, Xuewen Liu
, Gang Chuai
, Weidong Gao
, Xiangyu Chen
:
An Inter-Slice RB Leasing and Association Adjustment Scheme in O-RAN. 402-417 - Quan Nguyen, Hieu H. Pham
, Kok-Seng Wong
, Phi Le Nguyen
, Truong Thao Nguyen
, Minh N. Do
:
FedDCT: Federated Learning of Large Convolutional Neural Networks on Resource-Constrained Devices Using Divide and Collaborative Training. 418-436 - Fateme Salehi
, Mustafa Özger
, Cicek Cavdar
:
Reliability and Delay Analysis of 3-Dimensional Networks With Multi-Connectivity: Satellite, HAPs, and Cellular Communications. 437-450 - Xiaojian Tian
, Zuqing Zhu
:
On the Fine-Grained Distributed Routing and Data Scheduling for Interplanetary Data Transfers. 451-462 - Abdennaceur Ghandri
, Houssem Eddine Nouri
, Maher Ben Jemaa:
Deep Learning for VBR Traffic Prediction-Based Proactive MBSFN Resource Allocation Approach. 463-476 - Mai T. P. Le
, Hieu V. Nguyen, Vien Nguyen-Duy-Nhat, Luca Sanguinetti
:
QoE-Aware Power Allocation for Aerial-Relay Massive MIMO Networks. 477-489 - Mohammad Nassar, Ori Rottenstreich
, Ariel Orda
:
CFTO: Communication-Aware Fairness in Blockchain Transaction Ordering. 490-506 - Soosan Naderi Mighan, Jelena V. Misic
, Vojislav B. Misic
, Xiaolin Chang
:
An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus. 507-516 - Tasiu Muazu
, Yingchi Mao
, Abdullahi Uwaisu Muhammad, Muhammad Ibrahim
, Omaji Samuel
, Prayag Tiwari
:
IoMT: A Medical Resource Management System Using Edge Empowered Blockchain Federated Learning. 517-534 - Malka N. Halgamuge
, Geetha K. Munasinghe, Moshe Zukerman
:
Time Estimation for a New Block Generation in Blockchain-Enabled Internet of Things. 535-557 - Jiaming Cheng
, Duong Tung Nguyen
, Vijay K. Bhargava:
Resilient Edge Service Placement Under Demand and Node Failure Uncertainties. 558-573 - Piao Lv
, Zhen Zhang
, Yuhui Deng
, Lin Cui
, Longxin Lin:
HVMM: A Holistic Virtual Machine Management Strategy for Cloud Data Centers. 574-589 - Jiaxin Chang
, Jian Wang
, Bing Li
, Yuqi Zhao
, Duantengchuan Li
:
Attention-Based Deep Reinforcement Learning for Edge User Allocation. 590-604 - Angelos-Christos Maroudis
, Theodoros Theodoropoulos, John Violos
, Aris Leivadeas
, Konstantinos Tserpes
:
Leveraging Graph Neural Networks for SLA Violation Prediction in Cloud Computing. 605-620 - Haiyan Wang
, Wei Li
, Jiayu Sun, Li Zhao
, Xingmei Wang, Hongwu Lv
, Guangsheng Feng
:
Low-Complexity and Efficient Dependent Subtask Offloading Strategy in IoT Integrated With Multi-Access Edge Computing. 621-636 - Guoxiang Zhong
, Fagui Liu
, Jun Jiang
, C. L. Philip Chen
:
CauseFormer: Interpretable Anomaly Detection With Stepwise Attention for Cloud Service. 637-652 - Dharavath Ramesh
, Naela Rizvi
, P. C. Srinivasa Rao, Elankovan A. Sundararajan
, Koushik Mondal
, Gautam Srivastava
, Lianyong Qi
:
Improved Chemical Reaction Optimization With Fitness-Based Quasi-Reflection Method for Scheduling in Hybrid Cloud-Fog Environment. 653-669 - Mohamad Al Adraa
, Chadi Assi
, Mohammed Almekhlafi
, Maurice Khabbaz
, Vladimir Pelekhaty
, Michael Y. Frankel
:
Comprehensive Performance and Robustness Analysis of Expander-Based Data Centers. 670-683 - Baofeng Ji
, Mi Zhang
, Jiayu Huang, Yi Wang
, Ling Xing
, Tingpeng Li, Congzheng Han
, Shahid Mumtaz
:
Research on Offloading Strategy of Twin UAVs Edge Computing Tasks for Emergency Communication. 684-696 - Ippokratis Sartzetakis
, Polyzois Soumplis
, Panagiotis Pantazopoulos
, Konstantinos V. Katsaros
, Vasilis Sourlas, Emmanouel A. Varvarigos:
Edge/Cloud Infinite-Time Horizon Resource Allocation for Distributed Machine Learning and General Tasks. 697-713 - Yuming Zhang, Bohao Feng
, Aleteng Tian, Shui Yu
, Hongke Zhang
:
Task Offloading Control and Customized Workload Scheduling in Multi-Layer Cloud Networks. 714-728 - Mustafa Can Çavdar
, Ibrahim Korpeoglu
, Özgür Ulusoy
:
Application Scheduling With Multiplexed Sensing of Monitoring Points in Multi-Purpose IoT Wireless Sensor Networks. 729-744 - Shengxu Xie
, Guyu Hu, Changyou Xing
, Yaqun Liu
:
Online Elephant Flow Prediction for Load Balancing in Programmable Switch-Based DCN. 745-758 - Shiva Shamaei
, Siavash Bayat
, Ali Mohammad Afshin Hemmatyar
:
Interference-Aware Resource Allocation Algorithm for D2D-Enabled Cellular Networks Using Matching Theory. 759-772 - Madhan Raj Kanagarathinam
, Krishna M. Sivalingam, Gunjan Kumar Choudhary
:
Application Prioritization Engine for Enhancing Real-Time Performance in Smartphones. 773-788 - Apurba Adhikary
, Md. Shirajum Munir
, Avi Deb Raha
, Yu Qiao
, Zhu Han
, Choong Seon Hong
:
Integrated Sensing, Localization, and Communication in Holographic MIMO-Enabled Wireless Network: A Deep Learning Approach. 789-809 - Amandeep Kaur
, Ayushi Godara
:
Machine Learning Empowered Green Task Offloading for Mobile Edge Computing in 5G Networks. 810-820 - Lianming Zhang
, Kai Xiao
, Lingbo Jin
, Pingping Dong
, Zhao Tong
:
Mobility-Aware and Double Auction-Based Joint Task Offloading and Resource Allocation Algorithm in MEC. 821-837 - Shraddha Tripathi
, Om Jee Pandey
, Rajesh M. Hegde:
Socially Aware Network Clustering for Throughput Maximization in Mobile Wireless Sensor Networks. 838-850 - Mario Di Mauro
, Giovanni Galatro
, Fabio Postiglione
, Wei Song
, Antonio Liotta
:
Multivariate Time Series Characterization and Forecasting of VoIP Traffic in Real Mobile Networks. 851-865 - Mayank Gupta
, Shankar Prakriya
:
Performance of NOMA-Based Spectrally-Efficient Uplink Underlay Multiuser Networks With Imperfect SIC. 866-881 - Yujie Song
, Yue Cao
, Yingzhe Hou
, Bo Cai, Celimuge Wu
, Zhili Sun
:
A Channel Perceiving-Based Handover Management in Space-Ground Integrated Information Network. 882-896 - Ali Muhammad
, Mohamed Kadry Elhattab
, Mohamed Amine Arfaoui
, Chadi Assi
:
Optimizing Age of Information in RIS-Empowered Uplink Cooperative NOMA Networks. 897-907 - Stefan Schneider
, Holger Karl
, Ramin Khalili, Artur Hecker:
Multi-Agent Deep Reinforcement Learning for Coordinated Multipoint in Mobile Networks. 908-924 - Ali Muhammad
, Mohamed Kadry Elhattab
, Mohamed Amine Arfaoui
, Ahmed Al-Hilo, Chadi Assi
:
Age of Information Optimization in RIS-Assisted Wireless Networks. 925-938 - Bolei Zhang
, Fu Xiao
, Lifa Wu:
Offline Reinforcement Learning for Asynchronous Task Offloading in Mobile Edge Computing. 939-952 - Yu Liu
, Luhan Wang
, Zhaoming Lu
, Keliang Du
, Guochu Shou
:
A Stateless Design of Satellite-Terrestrial Integrated Core Network and Its Deployment Strategy. 953-966 - Junli Xue
, Guochu Shou
, Yaqiong Liu
, Yihong Hu
:
Scheduling Time-Critical Traffic With Virtual Queues in Software-Defined Time-Sensitive Networking. 967-978 - Seyedeh Negar Afrasiabi
, Amin Ebrahimzadeh
, Nattakorn Promwongsa
, Carla Mouradian
, Wubin Li, Ákos Recse
, Róbert Szabó
, Roch H. Glitho:
Cost-Efficient Cluster Migration of VNFs for Service Function Chain Embedding. 979-993 - Adnei W. Donatti
, Sand Luz Corrêa
, Joberto S. B. Martins
, Antônio J. G. Abelém
, Cristiano Bonato Both
, Flávio de Oliveira Silva
, José Augusto Suruagy Monteiro
, Rafael Pasquini
, Rodrigo Moreira
, Kleber Vieira Cardoso
, Tereza Cristina M. B. Carvalho:
Survey on Machine Learning-Enabled Network Slicing: Covering the Entire Life Cycle. 994-1011 - Walid A. Aljoby
, Xin Wang
, Dinil Mon Divakaran
, Tom Z. J. Fu
, Richard T. B. Ma
, Khaled A. Harras
:
DiffPerf: Toward Performance Differentiation and Optimization With SDN Implementation. 1012-1031 - Haotong Cao
, Neeraj Kumar
, Longxiang Yang
, Mohsen Guizani
, F. Richard Yu
:
Resource Orchestration and Allocation of E2E Slices in Softwarized UAVs-Assisted 6G Terrestrial Networks. 1032-1047 - Qiao Lu
, Changcheng Huang
:
Performance Modeling and Joint Resource Allocation Algorithms for Online Virtual Network Embedding. 1048-1066 - Carmine Scarpitta
, Giulio Sidoretti
, Andrea Mayer
, Stefano Salsano
, Ahmed Abdelsalam
, Clarence Filsfils:
High Performance Delay Monitoring for SRv6-Based SD-WANs. 1067-1081 - Elie F. Kfoury
, Jorge Crichigno
, Elias Bou-Harb
:
P4BS: Leveraging Passive Measurements From P4 Switches to Dynamically Modify a Router's Buffer Size. 1082-1099 - Parinaz Rezaeimoghaddam, Irfan S. Al-Anbagi
:
Cost-Efficient and Trust-Aware Virtual Network Embedding for Dense Industrial IoT Systems Using Multiagent Systems. 1100-1114 - Esmaeil Amiri
, Ning Wang
, Mohammad Shojafar
, Mutasem Q. Hamdan
, Chuan Heng Foh
, Rahim Tafazolli
:
Deep Reinforcement Learning for Robust VNF Reconfigurations in O-RAN. 1115-1128 - Nisarg P. Patel
, Raj Parekh
, Saad Ali Amin, Rajesh Gupta
, Sudeep Tanwar
, Neeraj Kumar
, Rahat Iqbal
, Ravi Sharma
:
LEAF: A Federated Learning-Aware Privacy-Preserving Framework for Healthcare Ecosystem. 1129-1141 - Asad Ali
, Ying-Dar Lin
, Chi-Yu Li
, Yuan-Cheng Lai
:
Transparent Third-Party Authentication With Application Mobility for 5G Mobile-Edge Computing. 1142-1157 - Kim Hammar
, Rolf Stadler
:
Learning Near-Optimal Intrusion Responses Against Dynamic Attackers. 1158-1177 - Hichem Sedjelmaci
, Abdelwahab Boualouache
:
When Two-Layer Federated Learning and Mean-Field Game Meet 5G and Beyond Security: Cooperative Defense Systems for 5G and Beyond Network Slicing. 1178-1189 - Ulya Sabeel
, Shahram Shah-Heydari
, Khalil El-Khatib
, Khalid Elgazzar:
Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey. 1190-1212 - Himani Sikarwar
, Debasis Das
:
SecEdge: Secure Edge-Computing-Based Hybrid Approach for Data Collection and Searching in IoV. 1213-1225 - Aviram Zilberman
, Ariel Stulman
, Amit Dvir
:
Identifying a Malicious Node in a UAV Network. 1226-1240 - Jun Cai
, Zirui Zhou, Zhongwei Huang
, Wenlong Dai
, Fei Richard Yu
:
Privacy-Preserving Deployment Mechanism for Service Function Chains Across Multiple Domains. 1241-1256 - Ping Zhao
, Yaqiong Mu
, Ziyi Yang
, Jianming Wu, Biyou Wang, Zhonglin Wang:
Graph-Based Data Publication via Differentially Structural Inference. 1257-1270 - Patrick Krämer
, Benedikt Baier
, Niklas Landerer, Philip Diederich
, Alexander Griessel
, Oliver Hohlfeld, Andreas Blenk
, Martin Mieth, Wolfgang Kellerer
:
ProFi: Scalable and Efficient Website Fingerprinting. 1271-1286 - Khaled Sarieddine
, Mohammad Ali Sayed
, Chadi Assi
, Ribal Atallah, Sadegh Torabi
, Joseph Khoury
, Morteza Safaei Pour
, Elias Bou-Harb
:
EV Charging Infrastructure Discovery to Contextualize Its Deployment Security. 1287-1301 - Tiankuo Yu, Hui Yang, Qiuyan Yao, Ao Yu, Yang Zhao, Sheng Liu, Yunbo Li, Jie Zhang, Mohamed Cheriet
:
Multi-Visual-GRU-Based Survivable Computing Power Scheduling in Metro Optical Networks. 1302-1315
Volume 21, Number 2, April 2024
- Rabimba Karanjai
, Keshav Kasichainula, Lei Xu
, Nour Diallo, Lin Chen, Weidong Shi
:
DIaC: Re-Imagining Decentralized Infrastructure as Code Using Blockchain. 1319-1332 - Jemin Andrew Choi, Sidi Mohamed Beillahi
, Srisht Fateh Singh
, Panagiotis Michalopoulos
, Peilun Li
, Andreas G. Veneris, Fan Long:
LMPT: A Novel Authenticated Data Structure to Eliminate Storage Bottlenecks for High Performance Blockchains. 1333-1343 - Takanori Hara
, Masahiro Sasabe
:
Capacitated Shortest Path Tour-Based Service Chaining Adaptive to Changes of Service Demand and Network Topology. 1344-1358 - Andrea Mayer
, Lorenzo Bracciale
, Paolo Lungaroni
, Giulio Sidoretti
, Stefano Salsano
, Giuseppe Bianchi
, Pierpaolo Loreti
:
Composing eBPF Programs Made Easy With HIKe and eCLAT. 1359-1371 - Kaan Aykurt
, Johannes Zerwas
, Andreas Blenk
, Wolfgang Kellerer
:
When TCP Meets Reconfigurations: A Comprehensive Measurement Study. 1372-1386 - Marian Ulbricht
, Stefan Senk
, Hosein K. Nazari
, How-Hang Liu
, Martin Reisslein
, Giang T. Nguyen
, Frank H. P. Fitzek
:
TSN-FlexTest: Flexible TSN Measurement Testbed. 1387-1402 - Juan Fang
, Dezheng Qu, Huijie Chen
, Yaqi Liu:
Dependency-Aware Dynamic Task Offloading Based on Deep Reinforcement Learning in Mobile-Edge Computing. 1403-1415 - Abdullah Othman
, Joao V. C. Evangelista
, Georges Kaddoum
, Minh Au, Basile L. Agba:
Joint Optimization of Radio Resources and Coverage Enhancement in Massive Microgrid Networks. 1416-1431 - Tobias Sundqvist
, Monowar H. Bhuyan
, Erik Elmroth
:
Robust Procedural Learning for Anomaly Detection and Observability in 5G RAN. 1432-1445 - Zihan Chen
, Guang Cheng
, Zijun Wei, Dandan Niu
, Nan Fu:
Classify Traffic Rather Than Flow: Versatile Multi-Flow Encrypted Traffic Classification With Flow Clustering. 1446-1466 - Xin Jiang
, Heng-Ru Zhang
, Yao Zhou:
Multi-Granularity Abnormal Traffic Detection Based on Multi-Instance Learning. 1467-1477 - Sihoon Moon
, Sanghoon Lee
, Wonhong Jeon, Kyung-Joon Park
:
Learning-Enabled Network-Control Co-Design for Energy-Efficient Industrial Internet of Things. 1478-1489 - Qian Ning
, Menghan Yang
, Chengwen Tang, Linyu Huang
:
Optimizing Network Performance Through Joint Caching and Recommendation Policy for Continuous User Request Behavior. 1490-1502 - Chunyu Wei
, Yushun Fan
, Jia Zhang
, Zhixuan Jia
, Ruyu Yan
:
Dynamic Relation Graph Learning for Time-Aware Service Recommendation. 1503-1517 - Dimitrios J. Vergados, Angelos Michalas, Alexandros-Apostolos A. Boulogeorgos
, Spyridon Nikolaou, Nikolaos Asimopoulos, Dimitrios D. Vergados:
Adaptive Virtual Reality Streaming: A Case for TCP. 1518-1533 - Van An Le
, Yusheng Ji
, Huu Huy Tran, Phi Le Nguyen
, John C. S. Lui
:
Achieving Multi-Time-Step Segment Routing via Traffic Prediction and Compressive Sensing Techniques. 1534-1549 - Taeho Park
, Hochan Lee
, Heewon Kim, Subin Han, Taeyun Kim, Sangheon Pack
:
Divide and Cache: Design and Implementation of Control Plane Framework for Private 5G. 1550-1560 - Reza Farahani, Ekrem Çetinkaya, Christian Timmerer, Mohammad Shojafar, Mohammed Ghanbari, Hermann Hellwagner:
ALIVE: A Latency- and Cost-Aware Hybrid P2P-CDN Framework for Live Video Streaming. 1561-1580 - Matthew Nance Hall
, Paul Barford
, Klaus-Tycho Foerster
, Ramakrishnan Durairajan
:
Improving Scalability in Traffic Engineering via Optical Topology Programming. 1581-1600 - Gastón García González, Sergio Martinez Tagliafico, Alicia Fernández
, Gabriel Gómez Sena
, José Acuña, Pedro Casas
:
One Model to Find Them All Deep Learning for Multivariate Time-Series Anomaly Detection in Mobile Network Data. 1601-1616 - Ali Nikkhah
, Scott Jordan
:
Toward Equitable Peering: A Proposal for a Fair Peering Fee Between ISPs and Content Providers. 1617-1633 - Weiping Zheng
, Minli Hong, Ruihao Ye, Xiaomao Fan
, Yuxuan Liang
, Gansen Zhao
, Roger Zimmermann
:
End-to-End Delay Modeling via Leveraging Competitive Interaction Among Network Flows. 1634-1647 - K. Hemant Kumar Reddy
, Gautam Srivastava
, Rajat Subhra Goswami
, Diptendu Sinha Roy
:
A Hybrid Optimized Intelligent Resource-Constrained Service Scheduling for Unified IoT Applications in Smart Cities. 1648-1659 - Yuehao Zhu
, Jun Tao
, Haotian Wang
, Linxiao Yu, Yuantu Luo
, Tianyi Qi, Zuyan Wang
, Yifan Xu
:
DGNN: Accurate Darknet Application Classification Adopting Attention Graph Neural Network. 1660-1671 - Le Zhang
, Ye Du
:
A Dynamic Cascading Failure Model for LEO Satellite Networks. 1672-1689 - Haitao Zhao
, Yao Zhang
, Wenchao Xia
, Yiyang Ni
, Longxiang Yang
, Hongbo Zhu
:
Distributed Opportunistic Power Control for Uplink Cell-Free Massive MIMO-IoT Networks Under Ricean Fading Channels. 1690-1701 - Lotte Weedage
, Syllas R. C. Magalhães
, Clara Stegehuis
, Suzan Bayhan
:
On the Resilience of Cellular Networks: How Can National Roaming Help? 1702-1714 - Crispin Almodovar
, Fariza Sabrina
, Sarvnaz Karimi, Salahuddin A. Azad
:
LogFiT: Log Anomaly Detection Using Fine-Tuned Language Models. 1715-1723 - Nasrin Akhter
, Md. Redowan Mahmud
, Jiong Jin
, Jason But
, Iftekhar Ahmad
, Yong Xiang
:
Configurable Harris Hawks Optimisation for Application Placement in Space-Air-Ground Integrated Networks. 1724-1736 - Buqing Cao
, Mi Peng
, Ziming Xie, Jianxun Liu
, Hongfan Ye, Bing Li
, Kenneth K. Fletcher
:
PRKG: Pre-Training Representation and Knowledge-Graph-Enhanced Web Service Recommendation for Mashup Creation. 1737-1749 - Hao Wu
, Jian Yan
, Linling Kuang
:
Asynchronous Multi-Class Traffic Management in Wide Area Networks. 1750-1763 - Yang Xu
, Shihao Xiao, Huiling Wang, Cheng Zhang
, Zhifei Ni
, Wenjun Zhao, Guojun Wang
:
Redactable Blockchain-Based Secure and Accountable Data Management. 1764-1776 - Jelena V. Misic
, Vojislav B. Misic
, Xiaolin Chang
:
Toward Decentralization in DPoS Systems: Election, Voting, and Leader Selection Using Virtual Stake. 1777-1790 - Engin Zeydan
, Suayb S. Arslan
, Yekta Turk:
Exploring Blockchain Architectures for Network Sharing: Advantages, Limitations, and Suitability. 1791-1801 - Yuqing Ding
, Zhongcheng Wu, Yongchun Miao, Liyang Xie, Manyu Ding
:
Genuine On-Chain and Off-Chain Collaboration: Achieving Secure and Non-Repudiable File Sharing in Blockchain Applications. 1802-1816 - Jishu Wang
, Yaowei Wang, Xuan Zhang
, Zhi Jin
, Chao Zhu, LinYu Li
, Rui Zhu
, Shenglong Lv:
LearningChain: A Highly Scalable and Applicable Learning-Based Blockchain Performance Optimization Framework. 1817-1831 - Raz Segal
, Chen Avin
, Gabriel Scalosub
:
SOAR: Minimizing Network Utilization Cost With Bounded In-Network Computing. 1832-1851 - Hao Feng
, Tianqin Zhou
, Yuhui Deng
, Laurence T. Yang
:
A Holistic Energy-Aware and Probabilistic Determined VMP Strategy for Heterogeneous Data Centers. 1852-1866 - Abhishek Hazra
, Mainak Adhikari
, Dipak Kumar Sah, Tarachand Amgoth
:
Fair Scheduling and Computation Co-Offloading for Industrial Applications in Fog Networks. 1867-1876 - Antonio Calagna
, Yenchia Yu
, Paolo Giaccone
, Carla-Fabiana Chiasserini
:
Design, Modeling, and Implementation of Robust Migration of Stateful Edge Microservices. 1877-1893 - Alisson Medeiros
, Antonio Di Maio
, Torsten Braun
, Augusto Neto
:
TENET: Adaptive Service Chain Orchestrator for MEC-Enabled Low-Latency 6DoF Virtual Reality. 1894-1911 - Paulo Sena
, Antônio J. G. Abelém
, György Dán
, Daniel Sadoc Menasché
:
Management of Caching Policies and Redundancy Over Unreliable Channels. 1912-1928 - Seyed Mohammad Hosseini
, Sina Darabi
, Amir Hossein Jahangir
, Ali Movaghar
:
Yuz: Improving Performance of Cluster-Based Services by Near-L4 Session-Persistent Load Balancing. 1929-1942 - Jinfeng Dou
, Jiayu Song
, Jiabao Cao
, Xuejia Meng
, Jihui Cheng
, Meidan Liu:
Maximizing Utility Joint Optimization Based on Edge Full Cooperation. 1943-1957 - Benedetta Picano
, Romano Fantacci
:
A Combined Stochastic Network Calculus and Matching Theory Approach for Computational Offloading in a Heterogenous MEC Environment. 1958-1968 - Kaustabha Ray
, Ansuman Banerjee
, Nanjangud C. Narendra
:
Learning-Based Microservice Placement and Migration for Multi-Access Edge Computing. 1969-1982 - Jiayin Zhang
, Huiqun Yu
, Guisheng Fan
, Zengpeng Li
:
Elastic Task Offloading and Resource Allocation Over Hybrid Cloud: A Reinforcement Learning Approach. 1983-1997 - Xin Chen
, Chonglin Gu
, Xiaoyu Gao, Yanyu Shen, Zai-Xing Sun
, Hejiao Huang
:
Virtual Machine Placement for Minimizing Image Retrieval Cost and Communication Cost in Cloud Data Center. 1998-2011 - Qiong Wu
, Siyuan Wang
, Hongmei Ge
, Pingyi Fan
, Qiang Fan
, Khaled Ben Letaief
:
Delay-Sensitive Task Offloading in Vehicular Fog Computing-Assisted Platoons. 2012-2026 - K. S. Midhula
, P. Arun Raj Kumar
:
An Adaptive Congestion Control Protocol for Wireless Networks Using Deep Reinforcement Learning. 2027-2043 - Ali Nouruzi
, Nader Mokari
, Paeiz Azmi
, Eduard A. Jorswieck
, Melike Erol-Kantarci
:
Smart Dynamic Pricing and Cooperative Resource Management for Mobility-Aware and Multi-Tier Slice-Enabled 5G and Beyond Networks. 2044-2063 - Feng He
, Jiarong Liang
, Qingnian Li:
On Practical Reconstruction of Quality Virtual Backbones in Heterogeneous Wireless Sensor Networks With Faulty Nodes. 2064-2076 - Sayantini Majumdar
, Susanna Schwarzmann
, Riccardo Trivisonno
, Georg Carle
:
Toward Massive Distribution of Intelligence for 6G Network Management Using Double Deep Q-Networks. 2077-2094 - Chunlin Li
, Yongzheng Gan, Yong Zhang, Youlong Luo:
A Cooperative Computation Offloading Strategy With On-Demand Deployment of Multi-UAVs in UAV-Aided Mobile Edge Computing. 2095-2110 - Nidhi Sharma
, Krishan Kumar
:
Evolutionary Multi-Objective Optimization Algorithm for Resource Allocation Using Deep Neural Network in Ultra-Dense Networks. 2111-2124 - Irshad A. Meer
, Mustafa Özger
, Dominic A. Schupke
, Cicek Cavdar
:
Mobility Management for Cellular-Connected UAVs: Model-Based Versus Learning-Based Approaches for Service Availability. 2125-2139 - Ningchun Liu
, Shuai Gao, Xindi Hou, Teng Liang, Guobiao He
, Hongke Zhang
, Sajal K. Das
:
An ICN-Based Secure Task Cooperation in Challenging Wireless Edge Networks. 2140-2154 - Andrews A. Okine
, Nadir H. Adam
, Faisal Naeem
, Georges Kaddoum
:
Multi-Agent Deep Reinforcement Learning for Packet Routing in Tactical Mobile Sensor Networks. 2155-2169 - Abdalla Hussein
, Patrick Mitran
, Catherine Rosenberg
:
Operating Multi-User Massive MIMO Networks: Trade-Off Between Performance and Runtime. 2170-2186 - Tu N. Nguyen
, Thinh V. Le
, Manh V. Nguyen
, Hoa Ngoc Nguyen
, Son Vu
:
Optimizing Resource Allocation and VNF Embedding in RAN Slicing. 2187-2199 - Upendra Prajapati
, Bijoy Chand Chatterjee
, Amit Banerjee
:
OptiGSM: Greedy-Based Load Balancing With Minimum Switch Migrations in Software-Defined Networks. 2200-2210 - Long Qu
, Lingjie Yu, Peng Yu
, Maurice J. Khabbaz
:
Latency-Sensitive Parallel Multi-Path Service Flow Routing With Segmented VNF Processing in NFV-Enabled Networks. 2211-2223 - Pablo Salva-Garcia
, Ruben Ricart-Sanchez
, José M. Alcaraz-Calero
, Qi Wang
, Octavio Herrera-Ruiz:
An eBPF-XDP Hardware-Based Network Slicing Architecture for Future 6G Front- to Back-Haul Networks. 2224-2239 - Zehua Guo
, Changlin Li, Yang Li, Songshi Dou
, Bida Zhang, Weichao Wu:
Maintaining the Network Performance of Software-Defined WANs With Efficient Critical Routing. 2240-2252 - Ibrahim Tamim
, Abdallah Shami
, Lyndon Ong
:
ALAP: Availability- and Latency-Aware Protection for O-RAN: A Deep Q-Learning Approach. 2253-2265 - Chenlu Zhang
, Takehiro Sato
, Eiji Oki
:
Service Deployment for Parallelized Function Chains Considering Traffic-Dependent Delay. 2266-2286 - Shwetha Vittal
, Sourav Sarkar
, A. Antony Franklin
:
Revamping the Resilience and High Availability of 5G Core for 6G Ready Network Slices. 2287-2302 - Waixi Liu, Jun Cai
, Sen Ling, Jian-Yu Zhang, Qingchun Chen
:
QALL: Distributed Queue-Behavior-Aware Load Balancing Using Programmable Data Planes. 2303-2322 - Sharvari Ravindran
, Saptarshi Chaudhuri, Jyotsna Bapat
, Debabrata Das
:
Novel Adaptive Multi-User Multi-Services Scheduling to Enhance Throughput in 5G-Advanced and Beyond. 2323-2338 - Xenofon Vasilakos
, Shadi Moazzeni
, Anderson Bravalheri
, Pratchaya Jaisudthi, Reza Nejabati
, Dimitra Simeonidou
:
iOn-Profiler: Intelligent Online Multi-Objective VNF Profiling With Reinforcement Learning. 2339-2352 - Nils Rodday
, Ítalo Cunha
, Randy Bush, Ethan Katz-Bassett, Gabi Dreo Rodosek, Thomas C. Schmidt
, Matthias Wählisch
:
The Resource Public Key Infrastructure (RPKI): A Survey on Measurements and Future Prospects. 2353-2373 - Qian Wang
, Siguang Chen
, Meng Wu:
Communication-Efficient Personalized Federated Learning With Privacy-Preserving. 2374-2388 - Lei Du
, Zhaoquan Gu
, Ye Wang, Le Wang
, Yan Jia:
A Few-Shot Class-Incremental Learning Method for Network Intrusion Detection. 2389-2401 - Nan Wei, Lihua Yin
, Jingyi Tan
, Chuhong Ruan, Chuang Yin, Zhe Sun
, Xi Luo
:
An Autoencoder-Based Hybrid Detection Model for Intrusion Detection With Small-Sample Problem. 2402-2412 - Shuhua Deng
, Lihui Chen
, Xieping Gao
:
Manipulating Sensitive Match Fields to Poison Applications in SDN. 2413-2425 - Ruhui Ma
, Jin Cao
, Shiyang He, Yinghui Zhang
, Ben Niu
, Hui Li
:
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network. 2426-2444 - Guanghui Wang
, Yajie Li, Rui Liu
, Fei Tong
, Jianping Pan
, Fang Zuo
, Xin He
:
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things. 2445-2459 - Jianjin Zhao
, Qi Li
, Yueping Hong
, Meng Shen
:
MetaRockETC: Adaptive Encrypted Traffic Classification in Complex Network Environments via Time Series Analysis and Meta-Learning. 2460-2476 - Mingshu He
, Xiaojuan Wang
, Peng Wei, Liu Yang
, Yinglei Teng, Renjian Lyu:
Reinforcement Learning Meets Network Intrusion Detection: A Transferable and Adaptable Framework for Anomaly Behavior Identification. 2477-2492 - Xiaoling Tao
, Shen Lu
, Feng Zhao
, Rushi Lan
, Longsheng Chen, Lianyou Fu, Ruchun Jia:
User Behavior Threat Detection Based on Adaptive Sliding Window GAN. 2493-2503 - Sima Barzegar
, Marc Ruiz
, Luis Velasco
:
Autonomous Flow Routing for Near Real-Time Quality of Service Assurance. 2504-2514 - Killian Murphy
, Antoine Lavignotte
, Catherine Lepers
:
Fault Prediction for Heterogeneous Telecommunication Networks Using Machine Learning: A Survey. 2515-2538 - Debbarni Sarkar
, Yogita
, Satyendra Singh Yadav
, Vipin Pal
, Neeraj Kumar
, Sarat Kumar Patra:
A Comprehensive Survey on IRS-Assisted NOMA-Based 6G Wireless Network: Design Perspectives, Challenges and Future Directions. 2539-2562 - Rama Krishna Muni, Kolar Purushothama Naveen
:
Correction to "Optimal Subscription Policies for Participation-Dependent Social-Learning Markets". 2563-2565
Volume 21, Number 3, June 2024
- Friedrich Altheide
, Simon Buttgereit
, Michael Rossberg:
Increasing Resilience of SD-WAN by Distributing the Control Plane [Extended Version]. 2569-2581 - Markus Sosnowski
, Johannes Zirngibl
, Patrick Sattler
, Georg Carle, Claas Grohnfeldt
, Michele Russo, Daniele Sgandurra
:
EFACTLS: Effective Active TLS Fingerprinting for Large-Scale Server Deployment Characterization. 2582-2595 - Jagnyashini Debadarshini
, H. Manish Kausik
, Sudipta Saha
:
Structure-Adaptive Many-to-Many Data-Sharing for Internet-of-Things. 2596-2607 - Nur Zincir-Heywood, Robert Birke, Elias Bou-Harb, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova:
Guest Editorial: Special section on Networks, Systems, and Services Operations and Management Through Intelligence. 2608-2612 - Mahzabeen Emu
, Salimur Choudhury
, Kai Salomaa
:
Stochastic Resource Optimization for Metaverse Data Marketplace by Leveraging Quantum Neural Networks. 2613-2623 - Chenjing Tian, Haotong Cao
, Jun Xie
, Sahil Garg
, Mubarak Alrashoud
, Prayag Tiwari
:
Community Detection-Empowered Self-Adaptive Network Slicing in Multi-Tier Edge-Cloud System. 2624-2636 - Yuxing Tian, Lei Liu
, Jie Feng
, Qingqi Pei
, Chen Chen
, Jun Du
, Celimuge Wu:
Toward Robust and Generalizable Federated Graph Neural Networks for Decentralized Spatial-Temporal Data Modeling. 2637-2650 - Yilun Liu
, Shimin Tao, Weibin Meng, Jingyu Wang
, Hao Yang
, Yanfei Jiang:
Multi-Source Log Parsing With Pre-Trained Domain Classifier. 2651-2663 - Khalid El Yaacoub
, Oscar Stenhammar
, Selim Ickin
, Konstantinos Vandikas
:
Continual Learning With Siamese Neural Networks for Sustainable Network Management. 2664-2674 - Dean Carmel
, Isaac Keslassy
:
Dragonfly: In-Flight CCA Identification. 2675-2685 - Luca Gioacchini
, Marco Mellia
, Luca Vassio
, Idilio Drago
, Giulia Milan
, Zied Ben-Houidi
, Dario Rossi
:
Cross-Network Embeddings Transfer for Traffic Analysis. 2686-2699 - Alec F. Diallo
, Paul Patras
:
Cluster and Conquer: Malicious Traffic Classification at the Edge. 2700-2714 - Navid Malekghaini
, Elham Akbari, Mohammad Ali Salahuddin
, Noura Limam
, Raouf Boutaba
, Bertrand Mathieu
, Stephanie Moteau, Stéphane Tuffin
:
AutoML4ETC: Automated Neural Architecture Search for Real-World Encrypted Traffic Classification. 2715-2730 - Mi Chen
, Jalel Ben-Othman
, Lynda Mokdad:
Greedy Behavior Detection With Machine Learning for LoRaWAN Network. 2731-2740 - Mianjie Li
, Haozheng Cui
, Chihui Liu, Chun Shan
, Xiaojiang Du
, Mohsen Guizani
:
A Four-Dimensional Space-Based Data Multi-Embedding Mechanism for Network Services. 2741-2750 - Nour Alhussien
, Ahmed Aleroud
, Abdullah Melhem
, Samer Y. Khamaiseh
:
Constraining Adversarial Attacks on Network Intrusion Detection Systems: Transferability and Defense Analysis. 2751-2772 - Michael Seufert
, Katharina Dietz
, Nikolas Wehner
, Stefan Geißler
, Joshua Schüler, Manuel Wolz, Andreas Hotho, Pedro Casas
, Tobias Hoßfeld
, Anja Feldmann:
Marina: Realizing ML-Driven Real-Time Network Traffic Monitoring at Terabit Scale. 2773-2790 - Ariel L. C. Portela, Silvio E. S. B. Ribeiro, Rafael A. Menezes, Thelmo P. de Araújo, Rafael L. Gomes
:
T-For: An Adaptable Forecasting Model for Throughput Performance. 2791-2801 - Alan Collet
, Antonio Bazco Nogueras
, Albert Banchs
, Marco Fiore
:
Explainable and Transferable Loss Meta-Learning for Zero-Touch Anticipatory Network Management. 2802-2823 - Michael Seufert
, Irena Orsolic
:
Improving the Transfer of Machine Learning-Based Video QoE Estimation Across Diverse Networks. 2824-2836 - Prateek Bagora
, Amin Ebrahimzadeh
, Fetahi Wuhib
, Roch H. Glitho
:
Labeling Cloud Metrics Data for Fault Detection in Cloud Using Active Learning With Test Suite. 2837-2853 - Elie Inaty
, Ghattas Akkad
, Martin Maier
:
ANFIS-DBA: ANFIS-Based Dynamic Bandwidth Allocation Scheme for Latency Driven Cost Effective Next Generation PON. 2854-2865 - Mayank Swarnkar
, Rakesh Kumar:
BitIoT: A Bit Level Deep Packet Inspection Method for Identification of MQTT-Based IoT Devices in the Wild. 2866-2875 - Dehui Wei
, Jiao Zhang
, Haozhe Li, Yuanjie Liu, Xuan Zhang, Tian Pan
, Tao Huang
:
Breaking the Inertial Thinking: Non-Blocking Multipath Congestion Control Based on the Single-Subflow Reinforcement Learning Model. 2876-2887 - Ashutosh Balakrishnan
, Swades De
, Li-Chun Wang
:
CASE: A Joint Traffic and Energy Optimization Framework Toward Grid Connected Green Future Networks. 2888-2899 - Prajjwal Gupta
, Aviral Jain
, Sumaiya Thaseen Ikram
, Thippa Reddy Gadekallu
, Gautam Srivastava
:
DAIDNet: A Lightweight Domain-Aware Architecture for Automated Detection of Network Penetrations. 2900-2908 - Chunjing Han
, Bohai Guan
, Tong Li
, Di Kang
, Jifeng Qin
, Yulei Wu
:
Few-Shot Log Anomaly Detection Based on Matching Networks. 2909-2925 - José Camacho
, Katarzyna Wasielewska
, Rasmus Bro
, David Kotz
:
Interpretable Feature Learning in Multivariate Big Data Analysis for Network Monitoring. 2926-2943 - Meiyi Jiang
, Baojiang Cui
, Junsong Fu
, Tao Wang
, Ziqi Wang
:
KimeraPAD: A Novel Low-Overhead Real-Time Defense Against Website Fingerprinting Attacks Based on Deep Reinforcement Learning. 2944-2961 - Sapna Chaudhary
, Naval Kumar Shukla
, Prince Sachdeva, Sandip Chakraborty
, Mukulika Maity
:
Managing Connections by QUIC-TCP Racing: A First Look of Streaming Media Performance Over Popular HTTP/3 Browsers. 2962-2976 - Wenpeng Jing
, Changhao Liu
, Haoyuan Cai
, Xiangming Wen
, Zhaoming Lu
, Zhifei Wang
, Haijun Zhang
:
MEC-Based Super-Resolution Enhanced Adaptive Video Streaming Optimization for Mobile Networks With Satellite Backhaul. 2977-2991 - Jayasree Sengupta
, Mike Kosek
, Justus Fries
, Simone Ferlin-Reiter
, Vaibhav Bajpai
:
On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation, and Dataset. 2992-3007 - Neha Sharma
, Venkata Saai Praneeth Thota
, Tankala Yuvaraj, Shraddha Tripathi
, Om Jee Pandey
:
OptRISQL: Toward Performance Improvement of Time-Varying IoT Networks Using Q-Learning. 3008-3020 - Liqing Shan
, Songtao Gao
, Yiming Yu
, Fenghui Zhang
, Yuntao Hu
, Yinlu Wang
, Ming Chen
:
Resource Allocation for Multi-Cell Multi-Timeslot Transmission: Centralized and Distributed Algorithms. 3021-3034 - Mohammad Reza Abedi, Nader Mokari, Mohammad Reza Javan, Hamid Saeedi, Eduard A. Jorswieck, Halim Yanikomeroglu:
Safety-Aware Age of Information (S-AoI) for Collision Risk Minimization in Cell-Free mMIMO Platooning Networks. 3035-3053 - Eyal Horowicz
, Tal Shapira
, Yuval Shavitt
:
Self-Supervised Traffic Classification: Flow Embedding and Few-Shot Solutions. 3054-3067 - Roberto Martínez
, Pedro Reviriego
, David Larrabeiti
:
Supporting Dynamic Insertions in xor and Binary Fuse Filters With the Integrated xor/BIF-Bloom Filter. 3068-3079 - Xin Li
, Yongli Zhao
, Xiaosong Yu
, Hua Wang, Wei Chen
, Shuang Wang
, Jie Zhang
:
Joint Bandwidth and Key on Demand (BKoD) Provisioning for Dynamic Service of Optical Transport Networks in F6G. 3080-3094 - Yang Tian
, Xin Liao
, Li Dong
, Yang Xu
, Hongbo Jiang
:
Amount-Based Covert Communication Over Blockchain. 3095-3111 - Bo Yin
, Binyao Xu, Yihu Liu, Tianxu Wang:
Enabling Secure and Traceable Query Services for Internet of Things Using Blockchain. 3112-3123 - Haoxiang Luo
, Yifan Wu, Gang Sun
, Hongfang Yu
, Mohsen Guizani
:
ESCM: An Efficient and Secure Communication Mechanism for UAV Networks. 3124-3139 - Utsa Roy
, Nirnay Ghosh
:
FabMAN: A Framework for Ledger Storage and Size Management for Hyperledger Fabric-Based IoT Applications. 3140-3151 - Longxia Huang
, Hao Lei, Liang-Min Wang:
MPC+: Secure, Compatible and Efficient Off-Blockchain Multi-Node Payment Channel. 3152-3166 - Gustavo Franco Camilo
, Gabriel Antonio F. Rebello
, Lucas Airam C. de Souza
, Miguel Elias M. Campista
, Luís Henrique M. K. Costa
:
ProfitPilot: Enabling Rebalancing in Payment Channel Networks Through Profitable Cycle Creation. 3167-3178 - Libo Feng
, Junyu Lin, Fei Qiu
, Bei Yu
, Zhihua JIn, Jinli Wang
, Jing Cheng, Shaowen Yao
:
SDAC-BBPP: A Secure Dynamic Access Control Scheme With Blockchain-Based Privacy Protection for IIoT. 3179-3193 - Arad Kotzer, Daniel Gandelman, Ori Rottenstreich
:
SoK: Applications of Sketches and Rollups in Blockchain Networks. 3194-3208 - Deyu Luo
, Qingqing Cai, Gang Sun
, Hongfang Yu
, Dusit Niyato
:
Split-Chain-Based Efficient Blockchain-Assisted Cross-Domain Authentication for IoT. 3209-3223 - Zhuofan Liao
, Guiying Yin
, Xiaoyong Tang
, Penglu Liu
:
A Cooperative Community-Based Framework for Service Caching and Task Offloading in Multi-Access Edge Computing. 3224-3235 - Ziyi Teng, Juan Fang
, Yaqi Liu:
Combining Lyapunov Optimization and Deep Reinforcement Learning for D2D Assisted Heterogeneous Collaborative Edge Caching. 3236-3248 - Guoxiang Zhong
, Fagui Liu
, Jun Jiang
, Bin Wang
, Xi Yao, C. L. Philip Chen
:
Detecting Cloud Anomaly via Broad Network-Based Contrastive Autoencoder. 3249-3263 - Xudong Tao
, Xiaoyan Qian
, Lei Han, Weibei Fan
, Yuzhou Shi
, Xinrui Zhu
, Zhiyu Li
, Shuwen Wei
, Rui Xu:
Key Flow First Prioritized Flow Scheduling Strategy in Multi-Tenant Data Centers. 3264-3277 - Chun-Che Lin
, Yao Chiang
, Hung-Yu Wei
:
Multi-Service Edge Computing Management With Multi-Stage Coalition Game Task Offloading. 3278-3291 - Anirban Lekharu
, Annanya Pratap Singh Chauhan
, Arijit Sur
, Moumita Patra
:
Reinforcement Learning-Based Adaptive Bitrate Caching at MEC Server. 3292-3304 - Daishi Kondo
, Thomas Ansquer, Yosuke Tanigawa
, Hideki Tode
:
Resource Breadcrumbs: Discovering Edge Computing Resources Over Named Data Networking. 3305-3316 - Muhammad Ejaz
, Jinsong Gui, Muhammad Asim, Mohammed Ahmed El-Affendi
, Carol J. Fung
, Ahmed A. Abd El-Latif:
RL-Planner: Reinforcement Learning-Enabled Efficient Path Planning in Multi-UAV MEC Systems. 3317-3329 - Sheng Zhu
, Jinting Wang
, Wei Wayne Li
:
Should Opportunists Be Encouraged? Optimal Decisions in Hybrid Cloud Service Systems. 3330-3343 - Lu Yang
, Songtao Guo
, Defang Liu
, Yue Zeng
, Xianlong Jiao
, Yuhao Zhou:
ConViTML: A Convolutional Vision Transformer-Based Meta-Learning Framework for Real-Time Edge Network Traffic Classification. 3344-3357 - Jian Li
, Qinglin Zhao
, Shaohua Teng
, Naiqi Wu
, Guanghui Li
, Yi Sun
:
HSA-EDI: An Efficient One-Round Integrity Verification for Mobile Edge Caching Using Hierarchical Signature Aggregation. 3358-3371 - Mohammad Hossein Shokouhi
, Mohammad Hadi
, Mohammad Reza Pakravan
:
Mobility-Aware Computation Offloading for Hierarchical Mobile Edge Computing. 3372-3384 - Hussein Muhi Hariz, Saeed Sheikh Zadeh Mosaddegh, Nader Mokari
, Mohammad Reza Javan
, Bijan Abbasi Arand
, Eduard A. Jorswieck
:
AI-Based Radio Resource Management and Trajectory Design for IRS-UAV-Assisted PD-NOMA Communication. 3385-3400 - Ayman Younis
, Sumit Maheshwari
, Dario Pompili
:
Energy-Latency Computation Offloading and Approximate Computing in Mobile-Edge Computing Networks. 3401-3415 - Nilesh Kumar Jadav
, Sudeep Tanwar
:
Whale Optimization-Based Access Control Scheme in D2D Communication Underlaying Cellular Networks. 3416-3427 - Pingping Dong
, Xiaojuan Lu, Tairan Huang, Liying Chen, Yang Yang, Lianming Zhang
:
Predictive Queue-Based Rate Control for Low Latency in Lossless Data Center Networks. 3428-3439 - Rui He, Bangbang Ren, Junjie Xie
, Deke Guo
, Laiping Zhao
:
Efficient Online Scheduling of Service Function Chains Across Multiple Geo-Distributed Regions. 3440-3453 - Weiqi Liu
, Mohammad Arif Hossain
, Nirwan Ansari
, Abbas Kiani
, Tony Saboorian:
Reinforcement Learning-Based Network Slicing Scheme for Optimized UE-QoS in Future Networks. 3454-3464 - Yicen Liu
, Junning Zhang
:
Service Function Chain Embedding Meets Machine Learning: Deep Reinforcement Learning Approach. 3465-3481 - Amir Al Sadi
, Marco Savi
, Andrea Melis
, Marco Prandini
, Franco Callegati
:
Unleashing Dynamic Pipeline Reconfiguration of P4 Switches for Efficient Network Monitoring. 3482-3497 - Dongmei Zhao, Guoqing Ji, Yiling Zhang, Xunzheng Han, Shuiguang Zeng
:
A Network Security Situation Prediction Method Based on SSA-GResNeSt. 3498-3510 - Nisha Kumari Barsha
, Neminath Hubballi
:
Anomaly Detection in SCADA Systems: A State Transition Modeling. 3511-3521 - Meng Yue
, Qingxin Yan
, Zichao Lu
, Zhijun Wu
:
CCS: A Cross-Plane Collaboration Strategy to Defend Against LDoS Attacks in SDN. 3522-3536 - Xiaofeng Jiang
, Qianbao Shi, Hengkun Miao, Wanqin Cao
, Huasen He
, Shuangwu Chen
, Jian Yang
:
Credible Link Flooding Attack Detection and Mitigation: A Blockchain-Based Approach. 3537-3554 - Li Yang
, Mirna El Rajab
, Abdallah Shami
, Sami Muhaidat
:
Enabling AutoML for Zero-Touch Network Security: Use-Case Driven Analysis. 3555-3582 - Jin Yang
, Xinyun Jiang
, Yulin Lei
, Weiheng Liang
, Zicheng Ma
, Siyu Li
:
MTSecurity: Privacy-Preserving Malicious Traffic Classification Using Graph Neural Network and Transformer. 3583-3597 - Degan Zhang, Hong-Zhan An
, Jie Zhang
, Ting Zhang
, Wen-miao Dong, Xing-Ru Jiang:
Novel Privacy Awareness Task Offloading Approach Based on Privacy Entropy. 3598-3608 - Xueyang Feng
, Zhongyuan Jiang
, Wei You, Jie Yang
, Xinghua Li
, Jian Feng Ma
:
PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture. 3609-3622 - Sam Maesschalck
, Will Fantom, Vasileios Giotsas
, Nicholas J. P. Race
:
These are Not the PLCs You are Looking for: Obfuscating PLCs to Mimic Honeypots. 3623-3635 - Bin Yuan
, Chi Zhang
, Jiajun Ren, Qunjinming Chen, Biang Xu, Qiankun Zhang
, Zhen Li, Deqing Zou
, Fan Zhang, Hai Jin
:
Toward Automated Attack Discovery in SDN Controllers Through Formal Verification. 3636-3655
Volume 21, Number 4, August 2024
- Mehmet Sükrü Kuran
, Oguz Kaan Koksal, Melih Kiliç, Deniz Ece Susuz, Ahmet Ugur Ilter, Gökçe Ekin Nehas, Sadik Öztürk:
MDU-CACS: A Coordinated Forecasting-Based Cloud-Assisted Dynamic Channel Assignment Mechanism for Wi-Fi Network Clusters. 3659-3680 - Everson Scherrer Borges
, Magnos Martinello
, Vitor Berger Bonella
, Abraão Jesus Dos Santos, Roberta L. Gomes
, Cristina K. Dominicini
, Rafael Silva Guimaraes
, Gabriel Tetzner Menegueti
, Marinho P. Barcellos
, Marco Ruffini
:
PoT-PolKA: Let the Edge Control the Proof-of-Transit in Path-Aware Networks. 3681-3691 - Chong Liu
, Ruixiang Li
, Fuxiang Yuan
, Shichang Ding
, Yan Liu
, Xiangyang Luo
:
6Subpattern: Target Generation Based on Subpattern Analysis for Internet-Wide IPv6 Scanning. 3692-3710 - Rong Chai
, Jin Liu
, Xiaorui Tang
, Kang'an Gui, Qianbin Chen
:
A Hybrid Offline and Online Resource Allocation Algorithm for Multibeam Satellite Communication Systems. 3711-3726 - Yu Liu
, Luhan Wang
, Zhaoming Lu
, Guochu Shou
:
A QoS Guaranteed Efficient Integration of UPF and LEO Satellite Networks. 3727-3739 - Daniele Bringhenti
, Simone Bussa
, Riccardo Sisto
, Fulvio Valenza
:
A Two-Fold Traffic Flow Model for Network Security Management. 3740-3758 - Muhammad Asad
, Safa Otoum
, Saima Shaukat:
Clients Eligibility-Based Lightweight Protocol in Federated Learning: An IDS Use Case. 3759-3774 - Lamees M. Al Qassem
, Thanos Stouraitis
, Ernesto Damiani
, Ibrahim M. Elfadel
:
Containerized Microservices: A Survey of Resource Management Frameworks. 3775-3796 - Joongheon Kim
, Soohyun Park
, Soyi Jung
, Carlos Cordeiro
:
Cooperative Multi-UAV Positioning for Aerial Internet Service Management: A Multi-Agent Deep Reinforcement Learning Approach. 3797-3812 - Tárcio R. Bezerra, J. Antão B. Moura
, Alberto Sampaio Lima
, José Neuman de Souza
:
Decision-Making Support in IT Services Sourcing Management Through a System Dynamics Model. 3813-3828 - Rong Chai
, Guorong Yang, Lei Liu, Qianbin Chen
:
DRL-Based Dynamic Resource Allocation for Multi-Beam Satellite Systems. 3829-3845 - Sifan Li, Yue Cao
, Hassan Jalil Hadi
, Feng Hao
, Faisal Bashir Hussain, Luan Chen
:
ECF-IDS: An Enhanced Cuckoo Filter-Based Intrusion Detection System for In-Vehicle Network. 3846-3860 - Surabhi Sharma
, Sateesh Kumar Peddoju
:
Efficient Multi-Broker Load Balancing in Event Driven Pub-Sub Networks. 3861-3873 - Shadi Bikas
, Müge Sayit
:
Improving QoE With Genetic Algorithm-Based Path Selection for MPTCP. 3874-3888 - Davide Borsatti
, Walter Cerroni
, Luca Foschini
, Genady Ya. Grabarnik, Lorenzo Manca
, Filippo Poltronieri
, Domenico Scotece
, Larisa Shwartz
, Cesare Stefanelli
, Mauro Tortonesi
, Mattia Zaccarini
:
KubeTwin: A Digital Twin Framework for Kubernetes Deployments at Scale. 3889-3903 - Yuanyuan Fu
, Jian Xu
:
LogTransformer: Transforming IT System Logs Into Events Using Tree-Based Approach. 3904-3918 - Rui Zhuang
, Jiangping Han
, Kaiping Xue
, Jian Li
, Qibin Sun
, Jun Lu
:
ProactMP: A Proactive Multipath Transport Protocol for Low-Latency Datacenters. 3919-3932 - Alessandro Staffolani, Victor-Alexandru Darvariu, Luca Foschini, Michele Girolami, Paolo Bellavista, Mirco MusolesiLuca Foschini:
PRORL: Proactive Resource Orchestrator for Open RANs Using Deep Reinforcement Learning. 3933-3944 - Suraj Kumar, Soumi Chattopadhyay
, Chandranath Adak
:
TPMCF: Temporal QoS Prediction Using Multi-Source Collaborative Features. 3945-3955 - Gaurav Baranwal
, Dinesh Kumar, Amit Biswas, Ravi Yadav
:
A Blockchain Framework for Efficient Resource Allocation in Edge Computing. 3956-3970 - Zhuo Hu
, Bozhi Liu
, Ao Shen
, Jie Luo
:
Blockchain-Based Resource Allocation Mechanism for the Internet of Vehicles: Balancing Efficiency and Security. 3971-3987 - Shalitha Wijethilaka
, Awaneesh Kumar Yadav
, An Braeken
, Madhusanka Liyanage
:
Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing. 3988-4005 - Baobao Chai
, Jiguo Yu
, Biwei Yan, Yong Yu
, Shengling Wang
:
BSCDA: Blockchain-Based Secure Cross-Domain Data Access Scheme for Internet of Things. 4006-4023 - Md Facklasur Rahaman
, Mohtasin Golam
, Md Raihan Subhan
, Esmot Ara Tuli
, Dong-Seong Kim
, Jae-Min Lee
:
Meta-Governance: Blockchain-Driven Metaverse Platform for Mitigating Misbehavior Using Smart Contract and AI. 4024-4038 - Yan-Xia Chang
, Qing Wang
, Quan-Lin Li
, Yaqian Ma, Chi Zhang:
Performance and Reliability Analysis for PBFT-Based Blockchain Systems With Repairable Voting Nodes. 4039-4060 - Shunrong Jiang
, Xiao Zhang
, Jingwei Chen, Jinpeng Li
, Haiqin Wu
, Yiliang Liu
, Yong Zhou
:
Privacy-Preserving and Fair Crowdsourcing Framework With Fine-Grained Reuse Based on Blockchain. 4061-4075 - Lixing Chen
, Feng Gao, Yang Bai
, Jun Wu
, Pan Zhou
, Zichuan Xu
:
Privacy-Preserving Blockchained Edge Resource Auction With Fraud Resistance. 4076-4089 - Penghao Sun
, Julong Lan, Yuxiang Hu, Zehua Guo
, Chong Wu, Jiangxing Wu:
Realizing the Carbon-Aware Service Provision in ICT System. 4090-4103 - Jiali Zheng
, Yuxi Zhang:
RSHS: A Blockchain Consensus Mechanism for Edge Computing-Supported Agri-IoT Systems. 4104-4118 - Huihui Wang, Chunping Wang, Kun Zhou, Duanyang Liu
, Xiaoli Zhang
, Hongbing Cheng
:
TEBChain: A Trusted and Efficient Blockchain-Based Data Sharing Scheme in UAV-Assisted IoV for Disaster Rescue. 4119-4130 - Ziyang Zhang
, Yang Zhao
, Huan Li, Jie Liu
:
BCEdge: SLO-Aware DNN Inference Services With Adaptive Batch-Concurrent Scheduling on Edge Devices. 4131-4145 - Song Zhang
, Wenxin Li
, Lide Suo
, Yuan Liu
, Yulong Li
, Jien Kato
, Keqiu Li:
BRT: Buffer Management for RDMA/TCP Mix-Flows in Datacenter Networks. 4146-4160 - Tushar Bose
, Nilesh Chatur
, Sonil Baberwal
, Aneek Adhya
:
Caching and Computing Resource Allocation in Cooperative Heterogeneous 5G Edge Networks Using Deep Reinforcement Learning. 4161-4178 - Qiong Wu
, Wenhua Wang, Pingyi Fan
, Qiang Fan
, Huiling Zhu
, Khaled B. Letaief
:
Cooperative Edge Caching Based on Elastic Federated and Multi-Agent Deep Reinforcement Learning in Next-Generation Networks. 4179-4196 - Zhenzhen Han
, Guofeng Zhao
, Yu Hu, Chuan Xu
, Kefei Cheng
, Shui Yu
:
Dynamic Bond Percolation-Based Reliable Topology Evolution Model for Dynamic Networks. 4197-4212 - Gustavo Zanatta Bruno
, Gabriel Matheus de Almeida
, Aditya Sathish
, Aloizio Pereira da Silva
, Luiz A. DaSilva
, Alexandre Huff
, Kleber Vieira Cardoso
, Cristiano Bonato Both
:
Evaluating the Deployment of a Disaggregated Open RAN Controller on a Distributed Cloud Infrastructure. 4213-4225 - Zhang Liu
, Lianfen Huang
, Zhibin Gao
, Manman Luo, Seyyedali Hosseinalipour
, Huaiyu Dai
:
GA-DRL: Graph Neural Network-Augmented Deep Reinforcement Learning for DAG Task Scheduling Over Dynamic Vehicular Clouds. 4226-4242 - Henda Sfaxi
, Imene Lahyani
, Sami Yangui
, Mouna Torjmen:
Latency-Aware and Proactive Service Placement for Edge Computing. 4243-4254 - Jingjing Yang
, Yuchun Guo, Yishuai Chen
, Yongxiang Zhao:
MicroNet: Operation Aware Root Cause Identification of Microservice System Anomalies. 4255-4267 - Rachid El Azouzi
, Francesco De Pellegrini
, Afaf Arfaoui
, Cédric Richier
, Jeremie Leguay
, Quang-Trung Luu
, Youcef Magnouche
, Sébastien Martin
:
Semi-Distributed Coflow Scheduling in Datacenters. 4268-4281 - Tom Goethals
, Mays F. Al-Naday
, Bruno Volckaert
, Filip De Turck
:
Warrens: Decentralized Connectionless Tunnels for Edge Container Networks. 4282-4296 - Chen Chen
, Jiabao Si
, Huan Li, Wei Han, Neeraj Kumar
, Stefano Berretti
, Shaohua Wan
:
A High Stability Clustering Scheme for the Internet of Vehicles. 4297-4311 - Xin Li
, Hui Zhou, Lirong Ma
, Jingjie Xin
, Shanguo Huang
:
Cost and Latency Customized SFC Deployment in Hybrid VNF and PNF Environment. 4312-4331 - Ramneek
, Patrick Hosein
, Sangheon Pack
:
CREDIT: A Credible Trust Framework for Dynamic Mobile Data Pricing Enforcement. 4332-4342 - Rana Muhammad Sohaib
, Oluwakayode Onireti
, Yusuf A. Sambo
, Rafiq Swash, Muhammad Imran
:
Energy Efficient Resource Allocation Framework Based on Dynamic Meta-Transfer Learning for V2X Communications. 4343-4356 - Nuanlai Wang
, Shanchen Pang
, Xiaofeng Ji, Min Wang
, Sibo Qiao
, ShiHang Yu
:
Intelligent Driving Task Scheduling Service in Vehicle-Edge Collaborative Networks Based on Deep Reinforcement Learning. 4357-4368 - Yibo Ma
, Tong Li
, Yan Zhou, Li Yu
, Depeng Jin
:
Mitigating Energy Consumption in Heterogeneous Mobile Networks Through Data-Driven Optimization. 4369-4382 - Jiayi Liu
, Zhongyi Xu, Chen Wang, Xuefang Liu, Xuemei Xie
, Guangming Shi
:
Mobility-Aware MEC Planning With a GNN-Based Graph Partitioning Framework. 4383-4395 - Elie El Haber
, Mohamed Kadry Elhattab
, Chadi Assi
, Sanaa Sharafeddine
, Kim Khoa Nguyen
:
Multi-IRS Aided Mobile Edge Computing for High Reliability and Low Latency Services. 4396-4409 - Jiajie Xu
, Kaixin Li
, Ying Chen
, Jiwei Huang
:
Optimal Task Scheduling and Resource Allocation for Self-Powered Sensors in Internet of Things: An Energy Efficient Approach. 4410-4420 - Qi Zhai
, Limeng Dong
, Chenxi Liu
, Yong Li
, Wei Cheng
:
Resource Management for Active RIS Aided Multi-Cluster SWIPT Cooperative NOMA Networks. 4421-4434 - Stefan Geißler
, Andra Lutu
, Florian Wamser
, Thomas Favale
, Viktoria Vomhoff, Michael Krolikowski, Marco Mellia
, Diego Perino, Tobias Hoßfeld
:
Untangling IoT Global Connectivity: The Importance of Mobile Signaling Traffic. 4435-4449 - Kaiyi Zhang
, Nancy Samaan
, Ahmed Karmouch:
A Machine Learning-Based Toolbox for P4 Programmable Data-Planes. 4450-4465 - Jinglan Song
, Yating Yang
, Wenyi Jin
, Tian Song
:
Adaptive Segmented Subscription for Efficient Data Dissemination in Vehicular Named Data Networks. 4466-4479 - Yu Wu, Jiayi Liu
, Chen Wang, Xuemei Xie
, Guangming Shi
:
Graph Transformer and LSTM Attention for VNF Multi-Step Workload Prediction in SFC. 4480-4493 - Wenhao Fan
, Xuewei Li, Bihua Tang
, Yi Su, Yuan'an Liu
:
MEC Network Slicing: Stackelberg-Game-Based Slice Pricing and Resource Allocation With QoS Guarantee. 4494-4509 - Felipe Arnhold
, Sivasankari S. Anbazhagan
, Lucio Rene Prade
, José Marcos S. Nogueira
, Aldebaro Klautau
, Cristiano Bonato Both
:
Network Slicing Support by Fronthaul Interface in Disaggregated Radio Access Networks: A Survey. 4510-4530 - Cheng Ren
, Jiangping Zhang
, Yu Wang
, Yaxin Li
:
On Efficient VNF-FG Design in IoT Networks. 4531-4542 - Nicolai Kröger
, Hasanin Harkous
, Fidan Mehmeti
, Wolfgang Kellerer
:
Performance Modeling and Analysis of P4 Programmable Devices With General Service Times. 4543-4562 - Fujun He
, Mitsuki Ito
, Takehiro Sato
, Eiji Oki
:
Probabilistic Protection for Both Computing and Transmission Capacities of Virtual Networks Under Multiple Facility Node Failures. 4563-4582 - Wenqian Li
, Long Qu
, Juan Liu
, Lingfu Xie:
Reliability-Aware Resource Allocation for SFC: A Column Generation-Based Link Protection Approach. 4583-4597 - Qinghua Zhang
, Xianchao Zhang
, Jia Chen
, Deyun Gao
, Yingda Wu, Yinhao Wang, Xu Huang
, Hongke Zhang
:
Service Function Chain Scheduling Under the Multi-Cloud Collaborative Service of Information Networks Used for Cross-Domain Remote Surgery. 4598-4612 - Zhihuang Ma, Tingyu Li
, Zichen Xu, Nelson L. S. da Fonseca
, Zuqing Zhu
:
SFCache: Hybrid NF Synthesization in Runtime With Rule-Caching in Programmable Switches. 4613-4624 - Changhao Qiu
, Bangbang Ren, Lailong Luo
, Guoming Tang
, Deke Guo
:
SFCPlanner: An Online SFC Planning Approach With SRv6 Flow Steering. 4625-4638 - Vaibhav Fanibhare
, Nurul I. Sarkar
, Adnan Al-Anbuky
:
TINetS3: SDN-Driven Network Slicing Enabling Scenario-Based Applications in Tactile Internet. 4639-4654 - Taha Ben Salah
, Marios Avgeris
, Aris Leivadeas
, Ioannis Lambadaris
:
VNF Placement and Dynamic NUMA Node Selection Through Core Consolidation at the Edge and Cloud. 4655-4668 - Marco Martalò
, Giovanni Pettorru
, Luigi Atzori
:
A Cross-Layer Survey on Secure and Low-Latency Communications in Next-Generation IoT. 4669-4685 - Ahmed Barnawi
, Prateek Chhikara
, Rajkumar Tekchandani
, Neeraj Kumar
, Bander A. Alzahrani:
A Differentially Privacy Assisted Federated Learning Scheme to Preserve Data Privacy for IoMT Applications. 4686-4700 - Yuping Lai
, Yiying Yu
, Wenbo Guan
, Lijuan Luo
, Jing Fan, Nanrun Zhou, Yuan Ping
:
A Lightweight Intrusion Detection System Using a Finite Dirichlet Mixture Model With Extended Stochastic Variational Inference. 4701-4712 - Xiaojuan Wang
, Yiqing Luo
, Mingshu He
, Xinlei Wang
:
A Semantic Detection Method for Network Flows With Global and Generalized Nature. 4713-4730 - Somayeh Kianpisheh
, Tarik Taleb
:
Collaborative Federated Learning for 6G With a Deep Reinforcement Learning-Based Controlling Mechanism: A DDoS Attack Detection Scenario. 4731-4749 - Ruizhi Xiao
, Weilong Li
, Jintian Lu
, Shuyuan Jin
:
ContexLog: Non-Parsing Log Anomaly Detection With All Information Preservation and Enhanced Contextual Representation. 4750-4762 - Yongkang Jiang
, Gaolei Li
, Shenghong Li
, Ying Guo
, Kai Zhou
:
Crowdsourcing Malware Family Annotation: Joint Class-Determined Tag Extraction and Weakly-Tagged Sample Inference. 4763-4776 - Jun Wang
, Hai Pei
, Ruiliang Wang
, Ruiquan Lin
, Zhou Fang
, Feng Shu
:
Defense Management Mechanism for Primary User Emulation Attack Based on Evolutionary Game in Energy Harvesting Cognitive Industrial Internet of Things. 4777-4786 - Liangyu Zhong
, Lulu Wang
, Lei Zhang, Josep Domingo-Ferrer
, Lin Xu
, Changti Wu
, Rui Zhang:
Dual-Server-Based Lightweight Privacy-Preserving Federated Learning. 4787-4800 - Jingyuan Liu
, Zheng Chang
, Kai Wang
, Zhiwei Zhao
, Timo Hämäläinen
:
Energy-Efficient and Privacy-Preserved Incentive Mechanism for Mobile Edge Computing-Assisted Federated Learning in Healthcare System. 4801-4815 - Gurpreet Singh
, Keshav Sood
, Rajalakshmi Pachamuthu
, Dinh Duc Nha Nguyen
, Yong Xiang
:
Evaluating Federated Learning-Based Intrusion Detection Scheme for Next Generation Networks. 4816-4829 - Xinhao Deng
, Mingwei Xu
, Qi Li
, Weijie Wu, Yuan Yang
, Menghao Zhang
, Yu Zhou
, Jianping Wu:
Exploring Dynamic Rule Caching Under Dependency Constraints for Programmable Switches: Theory, Algorithm, and Implementation. 4830-4843 - Abdullatif Albaseer
, Nima Abdi
, Mohamed M. Abdallah
, Marwa K. Qaraqe
, Saif Al-Kuwari
:
FedPot: A Quality-Aware Collaborative and Incentivized Honeypot-Based Detector for Smart Grid Networks. 4844-4860 - Yingchun Cui
, Jinghua Zhu
:
MChain-SFFL: Multi-Chain Aggregation Privacy Preserving for Server-Free Federated Learning. 4861-4870 - Yi-Ting Huang
, R. Vaitheeshwari
, Meng Chang Chen
, Ying-Dar Lin
, Ren-Hung Hwang, Po-Ching Lin
, Yuan-Cheng Lai
, Eric Hsiao-Kuang Wu
, Chung-Hsuan Chen, Zi-Jie Liao, Chung-Kuan Chen:
MITREtrieval: Retrieving MITRE Techniques From Unstructured Threat Reports by Fusion of Deep Learning and Ontology. 4871-4887 - Weiqi Dai
, Liangliang Yu, Yang Zhou, Kim-Kwang Raymond Choo
, Deqing Zou
, Xia Xie, Hai Jin
:
PASSP: A Private Authorization Scheme Oriented Service Providers. 4888-4899 - Junqing Le
, Di Zhang
, Fan Yang
, Tao Xiang
, Xiaofeng Liao
:
Secure and Efficient Continuous Learning Model for Traffic Flow Prediction. 4900-4911 - Jingjing Hu
, Yu Li, Zhaozhao Li
, Qinrang Liu, Jiangxing Wu:
Unveiling the Strategic Defense Mechanisms in Dynamic Heterogeneous Redundancy Architecture. 4912-4926
Volume 21, Number 5, October 2024
- Massimo Tornatore
, Teresa Gomes, Carmen Mas Machuca, Eiji Oki, Chadi Assi, Dominic Schupke
:
Guest Editors' Introduction: Special Issue on Robust and Resilient Future Communication Networks. 4929-4935 - Mario Minardi
, Thang X. Vu
, Ilora Maity
, Christos Politis, Symeon Chatzinotas
:
Traffic-Aware Virtual Network Embedding With Joint Load Balancing and Datarate Assignment for SDN-Based Networks. 4936-4948 - Amir Mohamad
, Hossam S. Hassanein
:
Preemptive Prediction-Based Placement of Time-Critical SFCs With VNF Sharing at the Edge. 4949-4961 - Xuefeng Yan, Nelson L. S. da Fonseca
, Zuqing Zhu
:
Self-Adaptive SRv6-INT-Driven System Adjustment in Runtime for Reliable Service Function Chaining. 4962-4973 - Paolo Medagliani
, Sébastien Martin
, Youcef Magnouche
, Jérémie Leguay
, Bruno Decraene
:
Distributed Tactical TE With Segment Routing. 4974-4987 - Yifan Miao
, Hui Tian
, Hao Wu
, Wanli Ni
, Yang Tian
:
Computation-Aware Link Repair for Large-Scale Damage in Distributed Cloud Networks. 4988-5000 - Dahina Koulougli
, Kim Khoa Nguyen
, Mohamed Cheriet
:
Optimized FlexEthernet for Inter-Domain Traffic Restoration. 5001-5017 - Tai Manh Ho
, Kim-Khoa Nguyen
, Mohamed Cheriet
:
Energy Efficiency Deep Reinforcement Learning for URLLC in 5G Mission-Critical Swarm Robotics. 5018-5032 - Fahime Khoramnejad
, Aisha Syed
, W. Sean Kennedy
, Melike Erol-Kantarci
:
Energy and Delay Aware General Task Dependent Offloading in UAV-Aided Smart Farms. 5033-5048 - B. Naresh Kumar Reddy
, Md. Zia Ur Rahman
, Aimé Lay-Ekuakille
:
Enhancing Reliability and Energy Efficiency in Many-Core Processors Through Fault-Tolerant Network-on-Chip. 5049-5062 - Shunwai Zhang
, Lulu Song, Rongfang Song
:
Robust Energy-Efficient RIS-Aided Multi-Antenna DF Relay Cooperative MIMO. 5063-5075 - Mohammed Abdullah
, Salah-Eddine Elayoubi
, Tijani Chahed
:
Efficient Queue Control Policies for Latency-Critical Traffic in Mobile Networks. 5076-5090 - Francesco Betti Sorbelli
, Punyasha Chatterjee
, Federico Corò
, Sajjad Ghobadi
, Lorenzo Palazzetti
, Cristina M. Pinotti
:
A Novel Graph-Based Multi-Layer Framework for Managing Drone BVLoS Operations. 5091-5105 - Mahmoud Wafik Eltokhey, Mohammad Ali Khalighi
, Zabih Ghassemlooy
, Volker Jungnickel
:
Handover-Aware Scheduling for Small- and Large-Scale VLC Networks. 5106-5117 - Hyunmin Noh
, Seunggyu Ji
, Yunmin Go, Gi Seok Park
, Hwangjun Song
:
Resilient and Fast Block Transmission System for Scalable Hyperledger Fabric Blockchain in Multi-Cloud Environments. 5118-5134 - Peng Liu
, Youquan Xian
, Chuanjian Yao, Peng Wang, Li-e Wang
, Xianxian Li
:
A Trustworthy and Consistent Blockchain Oracle Scheme for Industrial Internet of Things. 5135-5148 - Kumar Prateek
, Meghashrita Das, Sairaaj Surve
, Soumyadev Maity
, Ruhul Amin
:
Q-Secure-P²-SMA: Quantum-Secure Privacy- Preserving Smart Meter Authentication for Unbreakable Security in Smart Grid. 5149-5163 - Neeraj Sharma
, Kalpesh Kapoor:
Deadlock Prevention in Payment Channel Networks. 5164-5177 - Boubakr Nour
, Makan Pourzandi, Rushaan Kamran Qureshi
, Mourad Debbabi
:
AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery. 5178-5196 - Md. Masuduzzaman
, Tariq Rahim
, Anik Islam
, Soo Young Shin
:
UAV-Employed Intelligent Approach to Identify Injured Soldier on Blockchain-Integrated Internet of Battlefield Things. 5197-5214 - Hussah Albinali
, Farag Azzedin
:
Toward RPL Attacks and Mitigation Taxonomy: Systematic Literature Review Approach. 5215-5238 - Yize Yang
, Peng Shi
, Chee Peng Lim
, Jonathon A. Chambers:
Optimal Bipartite Tracking Control for Heterogeneous Systems Under DoS Attacks. 5239-5249 - Anna Volkova
, Abdorasoul Ghasemi
, Hermann de Meer
:
Towards Forming Optimal Communication Network for Effective Power System Restoration. 5250-5259 - Jakob Miserez
, Didier Colle
, Mario Pickavet
, Wouter Tavernier
:
Exploiting Queue Information for Scalable Delay-Constrained Routing in Deterministic Networks. 5260-5272 - Fabian Ihle
, Steffen Lindner
, Michael Menth
:
P4-PSFP: P4-Based Per-Stream Filtering and Policing for Time-Sensitive Networking. 5273-5290 - Luigi De Simone
, Mario Di Mauro
, Roberto Natella
, Fabio Postiglione
:
Performance and Availability Challenges in Designing Resilient 5G Architectures. 5291-5303 - Aurélien Chambon
, Abderrezak Rachedi
, Abderrahim Sahli
, Ahmed Mebarki
:
Managing a Resilient Multitier Architecture for Unstable IoT Networks in Location Based-Services. 5304-5320 - David Tipper
, Amy Babay
, Balaji Palanisamy, Prashant Krishnamurthy:
Network Connectivity Resilience in Next Generation Backhaul Networks: Challenges and Future Opportunities. 5321-5334 - Anita Murmu, Piyush Kumar, Nageswara Rao Moparthi
, Suyel Namasudra
, Pascal Lorenz
:
Reliable Federated Learning With GAN Model for Robust and Resilient Future Healthcare System. 5335-5346 - Beibei Cui
, Liang Liang
, Baofeng Ji
, Lei Zhang, Liang Zhao
, Kunpeng Zhang
, Fengzheng Shi, Jean-Charles Créput:
Exploring the YOLO-FT Deep Learning Algorithm for UAV-Based Smart Agriculture Detection in Communication Networks. 5347-5360 - Mahdi Rabbani
, Leila Rashidi, Ali A. Ghorbani
:
A Graph Learning-Based Approach for Lateral Movement Detection. 5361-5373 - Yan Jiao, Pin-Han Ho
, Xiangzhu Lu, János Tapolcai
, Limei Peng
:
A Novel Framework for Optical Layer Device Board Failure Localization in Optical Transport Network. 5374-5383 - Mahdieh Ahmadi
, Arash Moayyedi
, Muhammad Sulaiman
, Mohammad Ali Salahuddin
, Raouf Boutaba
, Aladdin Saleh:
Generalizable 5G RAN/MEC Slicing and Admission Control for Reliable Network Operation. 5384-5399 - Nicola Di Cicco
, Memedhe Ibrahimi
, Omran Ayoub
, Federica Bruschetta, Michele Milano, Claudio Passera, Francesco Musumeci
:
ASAP Hardware Failure-Cause Identification in Microwave Networks Using Venn-Abers Predictors. 5400-5409 - Idayat O. Sanusi
, Karim M. Nasr
:
A Reinforcement Learning Approach for D2D Spectrum Sharing in Wireless Industrial URLLC Networks. 5410-5419 - Nicola Di Cicco
, Memedhe Ibrahimi
, Francesco Musumeci
, Federica Bruschetta, Michele Milano, Claudio Passera, Massimo Tornatore
:
Machine Learning for Failure Management in Microwave Networks: A Data-Centric Approach. 5420-5431 - Yusuf Islam Demir
, Ahmet Yazar
, Hüseyin Arslan:
Waveform Management Approach With Machine Learning for 6G Systems. 5432-5444 - Ali Chouman, Dimitrios Michael Manias
, Abdallah Shami
:
A Modular, End-to-End Next-Generation Network Testbed: Toward a Fully Automated Network Management Platform. 5445-5463 - Guosheng Kang
, Yang Wang
, Hongshuai Ren
, Buqing Cao
, Jianxun Liu
, Yiping Wen
:
KS-GNN: Keyword Search via Graph Neural Network for Web API Recommendation. 5464-5474 - Luxi Zhao
, Xinyu Zhang, Feng He
, Zheng Li:
Incremental Performance Analysis for Accelerating Verification of TSN Network Reconfigurations. 5475-5490 - Caio Vinicius Dadauto
, Nelson L. S. da Fonseca
, Ricardo da Silva Torres
:
Data-Driven Intra-Autonomous Systems Graph Generator. 5491-5504 - Penghui Zhang
, Hua Zhang, Yibo Pi, Zijian Cao, Jingyu Wang, Jianxin Liao:
AdapINT: A Flexible and Adaptive In-Band Network Telemetry System Based on Deep Reinforcement Learning. 5505-5520 - Alex S. Santos
, Eonassis Oliveira Santos, Sabidur Rahman
, Lena Wosinska
, Juliana de Santi
, Gustavo B. Figueiredo
:
Multi-Criteria Decision Approach for Lightpath Restoration After Resource Crunch. 5521-5531 - Abid Yaqoob
, Gabriel-Miro Muntean
:
FReD-ViQ: Fuzzy Reinforcement Learning Driven Adaptive Streaming Solution for Improved Video Quality of Experience. 5532-5547 - Ke Gu
, Yi Wang
, Juan Qiu
, Xiong Li
, Jianming Zhang
:
Blockchain-Based Data Deduplication and Distributed Audit for Shared Data in Cloud-Fog Computing-Based VANETs. 5548-5565 - Jin Tian
, Junfeng Tian
, Ruizhong Du:
MSLTChain: A Trust Model Based on the Multi-Dimensional Subjective Logic for Tree Sharding Blockchain System. 5566-5581 - Yixin Li
, Liang Liang
, Yunjian Jia
, Wanli Wen
:
Presync: An Efficient Transaction Synchronization Protocol to Accelerate Block Propagation. 5582-5596 - Xiaoxuan Hu
, Yaochen Ling, Jialin Hua, Zhenjiang Dong
, Yanfei Sun
, Jin Qi
:
A Blockchain Cross-Chain Transaction Method Based on Decentralized Dynamic Reputation Value Assessment. 5597-5612 - Kento Yokouchi
, Ryuta Shiraki
, Eiji Oki
:
Multiple-Backup Resource Allocation Model for Virtual Machines With Probabilistic Protection. 5613-5633 - Huifeng Wu
, Mingsong Pan
, Jianyong Zhao
, Danfeng Sun
:
Dynamic Protocol Parsing System With Optimized Edge Containers. 5634-5646 - Fahime Khoramnejad
, Aisha Syed
, W. Sean Kennedy
, Melike Erol-Kantarci
:
Stability and Accuracy-Aware Learning for Task Offloading in UAV-MEC-Assisted Smart Farms. 5647-5661 - Shunhui Ji, Jiajia Li, Huiying Jin
, Ting Wei, Hai Dong
, Pengcheng Zhang
, Athman Bouguettaya
:
Space-Time-Aware Proactive QoS Monitoring for Mobile Edge Computing. 5662-5676 - Xi Liu
, Weidong Li:
A Truthful Randomized Mechanism for Heterogeneous Resource Allocation With Multi-Minded in Mobile Edge Computing. 5677-5690 - Binbin Huang
, Lingbin Wang, Xiao Liu
, Zixin Huang, Yuyu Yin
, Fujin Zhu
, Shangguang Wang, Shuiguang Deng
:
Reinforcement Learning-Based Online Scheduling of Multiple Workflows in Edge Environment. 5691-5706 - Huanlin Liu
, Yang Hu, Yong Chen
, Haonan Chen, Bingchuan Huang, Huiling Zhou, Shiqi Yi:
Multi-Cell Resource Allocation Mechanism Based on Interference Control in Indoor Multicolor VLC-WiFi Heterogeneous Networks. 5707-5717 - Madyan Alsenwi
, Eva Lagunas
, Symeon Chatzinotas
:
Distributed Learning Framework for eMBB-URLLC Multiplexing in Open Radio Access Networks. 5718-5732 - Miao Ye
, Chenwei Zhao, Peng Wen, Yong Wang
, Xiaoli Wang
, Hongbing Qiu
:
DHRL-FNMR: An Intelligent Multicast Routing Approach Based on Deep Hierarchical Reinforcement Learning in SDN. 5733-5755 - Suvrima Datta
, Aditya Kotha, U. Venkanna
, K. Mallikharjuna Rao
:
XNetIoT: An Extreme Quantized Neural Network Architecture for IoT Environment Using P4. 5756-5767 - Shubhani Aggarwal
, Georges Kaddoum
:
Authentication of Smart Grid by Integrating QKD and Blockchain in SCADA Systems. 5768-5780 - BongHwan Oh
:
P4-Based Proactive Monitoring Scheme in Software-Defined Networks. 5781-5794 - Zhiyuan Rao
, Lin You
, Gengran Hu
, Fei Zhu:
EBDTS: An Efficient BCoT-Based Data Trading System Using PUF for Authentication. 5795-5808 - Ibrahim Mohammed Sayem
, Moinul Islam Sayed, Sajal Saha
, Anwar Haque
:
ENIDS: A Deep Learning-Based Ensemble Framework for Network Intrusion Detection Systems. 5809-5825 - Kundan Kanti Saha
, Sangram Ray
, Mou Dasgupta
:
ECMHP: ECC-Based Secure Handshake Protocol for Multicasting in CCN-IoT Environment. 5826-5842 - Yange Chen
, Lei Liu
, Yuan Ping
, Mohammed Atiquzzaman
, Shahid Mumtaz
, Zhili Zhang
, Mohsen Guizani
, Zhihong Tian
:
A Privacy-Preserving Federated Learning Framework With Lightweight and Fair in IoT. 5843-5858 - Xi Luo, Honghui Fan
, Lihua Yin
, Shijie Jia
, Kaiyan Zhao
, Hongyu Yang
:
CAG-Malconv: A Byte-Level Malware Detection Method With CBAM and Attention-GRU. 5859-5872 - Yufu Wang
, Xingwei Wang
, Qiang Ni
, Wenjuan Yu
, Min Huang
:
BCDM: An Early-Stage DDoS Incident Monitoring Mechanism Based on Binary-CNN in IPv6 Network. 5873-5887 - Aditya Pathak
, Irfan S. Al-Anbagi
, Howard J. Hamilton:
SATI: Sidechain-Based Access Control & Trust Mechanism for IoT Networks. 5888-5903 - Liang Xie
, Zhou Su
, Yuntao Wang
:
A Two-Stage Secure Incentive Mechanism in App-and UAV-Assisted Crowdsensing. 5904-5918
Volume 21, Number 6, December 2024
- Raphael Hiesgen
, Marcin Nawrocki, Thomas C. Schmidt
, Matthias Wählisch
:
The Log4j Incident: A Comprehensive Measurement Study of a Critical Vulnerability. 5921-5934 - Marcos Carvalho
, Daniel Soares, Daniel Fernandes Macedo
:
QoE Estimation Across Different Cloud Gaming Services Using Transfer Learning. 5935-5946 - Samuel Kopmann
, Martina Zitterbart:
Importance Analysis of Micro-Flow Independent Features for Detecting Distributed Network Attacks. 5947-5957 - Zijun Hang
, Yongjie Wang
, Yuliang Lu
:
HSS: A Memory-Efficient, Accurate, and Fast Network Measurement Framework in Sliding Windows. 5958-5976 - Guosheng Kang
, Bowen Liang
, Jianxun Liu
, Yiping Wen
, Yong Xiao
, Hejing Nie:
Web API Recommendation via Leveraging Content and Network Semantics. 5977-5991 - Forough Shahab Samani
, Rolf Stadler
:
A Framework for Dynamically Meeting Performance Objectives on a Service Mesh. 5992-6007 - Shuaichao Wang
, Shaoyong Guo
, Jiakai Hao, Yinlin Ren
, Feng Qi
:
DPU-Enhanced Multi-Agent Actor-Critic Algorithm for Cross-Domain Resource Scheduling in Computing Power Network. 6008-6025 - Yunwu Wang
, Lingxing Kong
, Min Zhu
, Jiahua Gu
, Yuancheng Cai
, Jiao Zhang
:
Availability-Aware and Delay-Sensitive RAN Slicing Mapping Based on Deep Reinforcement Learning in Elastic Optical Networks. 6026-6040 - Angela Sara Cacciapuoti
, Jessica Illiano
, Michele Viscardi, Marcello Caleffi
:
Multipartite Entanglement Distribution in the Quantum Internet: Knowing When to Stop! 6041-6058 - Amar Rasheed
, Mohamed Baza
, Gautam Srivastava
, Narasimha Karpoor, Cihan Varol:
IoTDL2AIDS: Toward IoT-Based System Architecture Supporting Distributed LSTM Learning for Adaptive IDS on UAS. 6059-6081 - Qianqian Wu
, Qiang Liu
, Wenliang Zhu, Zefan Wu:
Energy Efficient UAV-Assisted IoT Data Collection: A Graph-Based Deep Reinforcement Learning Approach. 6082-6094 - Huanzhuo Wu
, Jia He, Jiakang Weng, Giang T. Nguyen
, Martin Reisslein
, Frank H. P. Fitzek
:
OptCDU: Optimizing the Computing Data Unit Size for COIN. 6095-6111 - Yifei Lu
, Jingqi Li, Shuren Li, Chanying Huang:
A Fine-Grained Packet Loss Tolerance Transmission Algorithm for Communication Optimization in Distributed Deep Learning. 6112-6125 - Agrippina Mwangi
, Nadine Kabbara
, Patrick Coudray, Mikkel P. S. Gryning
, Madeleine Gibescu
:
Investigating the Dependability of Software-Defined IIoT-Edge Networks for Next-Generation Offshore Wind Farms. 6126-6139 - Xinping Rao
, Le Qin
, Yugen Yi
, Jin Liu, Gang Lei
, Yuanlong Cao
:
A Novel Adaptive Device-Free Passive Indoor Fingerprinting Localization Under Dynamic Environment. 6140-6152 - Jiaze Shang
, Tianbo Lu
, Pengfei Zhao
:
SIM: Achieving High Profit Through Integration of Selfish Strategy Into Innocent Mining. 6153-6173 - Yepeng Ding
, Junwei Yu
, Shaowen Li
, Hiroyuki Sato
, Maro G. Machizawa
:
Data Aggregation Management With Self-Sovereign Identity in Decentralized Networks. 6174-6189 - Shigen Shen
, Xuanbin Hao, Zhengjun Gao, Guowen Wu
, Yizhou Shen
, Hong Zhang
, Qiying Cao
, Shui Yu
:
SAC-PP: Jointly Optimizing Privacy Protection and Computation Offloading for Mobile Edge Computing. 6190-6203 - Hui Wang
, Zhenyu Yang
, Ming Li
, Wei Xiao Zhang, Lan Yan Hu, Donghui Hu
:
CoSIS: A Secure, Scalability, Decentralized Blockchain via Complexity Theory. 6204-6217 - Yekaterina Podiatchev, Ariel Orda
, Ori Rottenstreich
:
Survivable Payment Channel Networks. 6218-6232 - Zihan Jiang, Qi Chen
, Zhihong Deng
, He Zhang:
LRB: Locally Repairable Blockchain for IoT Integration. 6233-6247 - Kaushik Mishra
, Santosh Kumar Majhi
, Kshira Sagar Sahoo
, Sourav Kumar Bhoi
, Monowar H. Bhuyan
, Amir H. Gandomi
:
Collaborative Cloud Resource Management and Task Consolidation Using JAYA Variants. 6248-6259 - Nidhi Sharma
, Krishan Kumar
:
A Novel Latency-Aware Resource Allocation and Offloading Strategy With Improved Prioritization and DDQN for Edge-Enabled UDNs. 6260-6272 - Jorge Pueyo
, Daniel Camps-Mur
, Miguel Catalan-Cid
:
PHaul: A PPO-Based Forwarding Agent for Sub6-Enhanced Integrated Access and Backhaul Networks. 6273-6289 - Kaustabha Ray
:
Context-Aware Fault Classification for Multi-Access Edge Computing. 6290-6300 - Bita Fatemipour
, Zhe Zhang
, Marc St-Hilaire
:
A Survey on Replica Transfer Optimization Schemes in Geographically Distributed Data Centers. 6301-6317 - Xiaohuan Li
, Bitao Chen, Junchuan Fan
, Jiawen Kang
, Jin Ye
, Xun Wang, Dusit Niyato
:
Cloud-Edge-End Collaborative Intelligent Service Computation Offloading: A Digital Twin Driven Edge Coalition Approach for Industrial IoT. 6318-6330 - Chengyi Qu
, Rounak Singh, Alicia Esquivel Morel
, Prasad Calyam
:
Learning-Based Multi-Drone Network Edge Orchestration for Video Analytics. 6331-6348 - Fekri Saleh
, Saleem Karmoshi
, Abraham O. Fapojuwo
, Hong Zhong
:
TARA: Tenant-Aware Resource Allocation in Multi-Tenant Data Centers. 6349-6363 - Menglan Hu
, Hao Wang
, Xiaohui Xu, Jianwen He, Yi Hu
, Tianping Deng, Kai Peng
:
Joint Optimization of Microservice Deployment and Routing in Edge via Multi-Objective Deep Reinforcement Learning. 6364-6381 - Xiwen Jie, Jiangping Han
, Guanglei Chen, Hang Wang, Peilin Hong
, Kaiping Xue
:
CACC: A Congestion-Aware Control Mechanism to Reduce INT Overhead and PFC Pause Delay. 6382-6397 - Jinbin Hu
, Zikai Zhou, Jin Zhang
:
Lightweight Automatic ECN Tuning Based on Deep Reinforcement Learning With Ultra-Low Overhead in Datacenter Networks. 6398-6408 - Jin Ye
, Tiantian Yu, Zhaoyi Li
, Jiawei Huang
:
SAR: Receiver-Driven Transport Protocol With Micro-Burst Prediction in Data Center Networks. 6409-6422 - Peng Peng
, Wentai Wu
, Weiwei Lin
, Fan Zhang
, Yongheng Liu, Keqin Li
:
Reliable Task Offloading in Sustainable Edge Computing with Imperfect Channel State Information. 6423-6436 - Chiao-Cheng Chen, Yao Chiang
, Yu-Chieh Lee
, Hung-Yu Wei
:
Edge Computing Management With Collaborative Lazy Pulling for Accelerated Container Startup. 6437-6450 - Biswadip Bandyopadhyay
, Pratyay Kuila
, Mahesh Chandra Govil:
Popularity-Conscious Service Caching and Offloading in Digital Twin and NOMA-Aided Connected Autonomous Vehicular Systems. 6451-6464 - Yuhan Su
, Yuchen Lin, Sicong Liu
, Minghui Liwang
, Xinqin Liao
, Tingzhu Wu
, Zhong Chen
, Xianbin Wang
:
Coexistence of Hybrid VLC-RF and Wi-Fi for Indoor Wireless Communication Systems: An Intelligent Approach. 6465-6479 - Sushmit Bhattacharjee
, Konstantinos Alexandris
, Thomas Bauschert:
Multi-Domain TSN Orchestration and Management for Large-Scale Industrial Networks. 6480-6492 - Youjia Chen
, Yuyang Zheng, Jian Xu, Hanyu Lin, Peng Cheng
, Ming Ding
, Xi Wang, Jinsong Hu
, Haifeng Zheng
:
Knowledge-Assisted Resource Allocation With Domain Adversarial Neural Networks. 6493-6504 - Yirui Wu
, Hao Cao, Yong Lai, Liang Zhao
, Xiaoheng Deng
, Shaohua Wan
:
Edge Computing and Few-Shot Learning Featured Intelligent Framework in Digital Twin Empowered Mobile Networks. 6505-6514 - Xin Wang, Jianhui Lv
, Adam Slowik
, Parameshachari Bidare Divakarachari, Keqin Li
, Chien-Ming Chen
, Saru Kumari
:
DLLF-2EN: Energy-Efficient Next Generation Mobile Network With Deep Learning-Based Load Forecasting. 6515-6526 - Mesfin Leranso Betalo
, Supeng Leng
, Hayla Nahom Abishu
, Abegaz Mohammed Seid
, Maged Fakirah
, Aiman Erbad
, Mohsen Guizani
:
Multi-Agent DRL-Based Energy Harvesting for Freshness of Data in UAV-Assisted Wireless Sensor Networks. 6527-6541 - Hossein Taghizadeh, Bardia Safaei
, Amir Mahdi Hosseini Monazzah
, Elyas Oustad, Sahar Rezagholi Lalani, Alireza Ejlali
:
LANTERN: Learning-Based Routing Policy for Reliable Energy-Harvesting IoT Networks. 6542-6554 - Sreenivasa Reddy Yeduri
, Sindhusha Jeeru, Om Jee Pandey
, Linga Reddy Cenkeramaddi
:
Energy-Efficient and Latency-Aware Data Routing in Small-World Internet of Drone Networks. 6555-6565 - Yoga Suhas Kuruba Manjunath
, Sihao Zhao
, Xiao-Ping Zhang
, Lian Zhao
:
Time-Distributed Feature Learning for Internet of Things Network Traffic Classification. 6566-6581 - Minghui Chang
, Haojun Lv, Yunqi Gao
, Bing Hu
, Wei Wang
, Ze Yang:
DGS: An Efficient Delay-Guaranteed Scheduling Framework for Wireless Deterministic Networking. 6582-6596 - Hansini Vijayaraghavan
, Wolfgang Kellerer
:
MobiFi: Mobility-Aware Reactive and Proactive Wireless Resource Management in LiFi-WiFi Networks. 6597-6613 - Thinh Duy Tran, Brigitte Jaumard
, Quang Huy Duong
, Kim-Khoa Nguyen
:
5G Service Function Chain Provisioning: A Deep Reinforcement Learning-Based Framework. 6614-6629 - Juan Lucas Vieira
, Daniel Mossé
, Diego G. Passos
:
LEAF: Improving Handoff Flexibility of IEEE 802.11 Networks With an SDN-Based Virtual Access Point Framework. 6630-6642 - Xiao-Yang Zhao
, Chuan Wu
, Xia Zhu:
Dynamic Flow Scheduling for DNN Training Workloads in Data Centers. 6643-6657 - Tingyu Li
, Zhihuang Ma, Zuqing Zhu
:
st-SFC: Optimizing Dynamic Deployment of Stateful SFCs on P4-Based PDP Switches. 6658-6669 - Ankur Mudgal
, Abhishek Verma
, Munesh Singh
, Kshira Sagar Sahoo
, Erik Elmroth
, Monowar Bhuyan
:
FloRa: Flow Table Low-Rate Overflow Reconnaissance and Detection in SDN. 6670-6683 - Yuqi Dai
, Hua Zhang
, Jingyu Wang
, Jianxin Liao
:
Multimodal Multitask Control Plane Verification Framework. 6684-6702 - Dan Tang
, Xiaocai Wang
, Keqin Li
, Chao Yin
, Wei Liang
, Jiliang Zhang
:
FAPM: A Fake Amplification Phenomenon Monitor to Filter DRDoS Attacks With P4 Data Plane. 6703-6715 - Haftay Gebreslasie Abreha
, Houcine Chougrani
, Ilora Maity
, Youssouf Drif
, Christos Politis, Symeon Chatzinotas
:
Fairness-Aware VNF Mapping and Scheduling in Satellite Edge Networks for Mission-Critical Applications. 6716-6730 - Bowen Bao
, Hui Yang
, Qiuyan Yao
, Jie Zhang
, Bijoy Chand Chatterjee
, Eiji Oki
:
Node-Oriented Slice Reconfiguration Based on Spatial and Temporal Traffic Prediction in Metro Optical Networks. 6731-6743 - Binbin Lu
, Yuan Wu, Li Ping Qian
, Sheng Zhou
, Haixia Zhang
, Rongxing Lu
:
Multi-Agent DRL-Based Two-Timescale Resource Allocation for Network Slicing in V2X Communications. 6744-6758 - Yingya Guo
, Bin Lin, Qi Tang
, Yulong Ma, Huan Luo
, Han Tian
, Kai Chen:
Distributed Traffic Engineering in Hybrid Software Defined Networks: A Multi-Agent Reinforcement Learning Framework. 6759-6769 - Jun Liu
, Paulo Renato da Costa Mendes, Andreas Wirsen
, Daniel Görges
:
MPC-Based 5G uRLLC Rate Calculation. 6770-6795 - Pin-Hsuan Chiang, Shi-Chun Tsai
:
Detection of Malicious Domains With Concept Drift Using Ensemble Learning. 6796-6809 - Kumar Prateek
, Soumyadev Maity
, Neetesh Saxena
:
QSKA: A Quantum Secured Privacy-Preserving Mutual Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication. 6810-6826 - Run-Hua Shi
, Xia-qin Fang
:
Quantum Scheme for Privacy-Preserving Range MAX/MIN Query in Edge-Based Internet of Things. 6827-6838 - Mahsa Raeiszadeh
, Amin Ebrahimzadeh
, Roch H. Glitho
, Johan Eker
, Raquel A. F. Mini:
Real-Time Adaptive Anomaly Detection in Industrial IoT Environments. 6839-6856 - Yashar Farzaneh Yeznabad
, Markus Helfert
, Gabriel-Miro Muntean
:
QoE-Driven Cross-Layer Bitrate Allocation Approach for MEC-Supported Adaptive Video Streaming. 6857-6874 - Ehsan Nowroozi
, Nada Jadalla, Samaneh Ghelichkhani, Alireza Jolfaei
:
Mitigating Label Flipping Attacks in Malicious URL Detectors Using Ensemble Trees. 6875-6884 - Yufei An
, F. Richard Yu
, Ying He
, Jianqiang Li
, Jianyong Chen
, Victor C. M. Leung
:
A Deep Learning System for Detecting IoT Web Attacks With a Joint Embedded Prediction Architecture (JEPA). 6885-6898 - Gunjan Kumar Saini
, Gaurav Somani
:
Is There a DDoS?: System+Application Variable Monitoring to Ascertain the Attack Presence. 6899-6908 - Daniele Bringhenti
, Fulvio Valenza
:
GreenShield: Optimizing Firewall Configuration for Sustainable Networks. 6909-6923 - Yunlong Deng
, Tao Peng
, Bangchao Wang
, Gan Wu
:
ANDE: Detect the Anonymity Web Traffic With Comprehensive Model. 6924-6936 - ZengRi Zeng
, Xuhui Liu, Ming Dai, Jian Zheng, Xiaoheng Deng
, Detian Zeng, Jie Chen
:
Causal Genetic Network Anomaly Detection Method for Imbalanced Data and Information Redundancy. 6937-6952 - Y A Joarder
, Carol J. Fung
:
Exploring QUIC Security and Privacy: A Comprehensive Survey on QUIC Security and Privacy Vulnerabilities, Threats, Attacks, and Future Research Directions. 6953-6973 - Himani Sikarwar
, Harsha Vasudev
, Debasis Das
, Mauro Conti
, Koustav Kumar Mondal
:
SECURE: Secure and Efficient Protocol Using Randomness and Edge-Computing for Drone-Assisted Internet of Vehicles. 6974-6988

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.